Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 20:32

General

  • Target

    fd9916fc84093309bed7643c13a15d64e03b2b5a0afdf384ba68cf7fe3e35cd9.eml

  • Size

    762KB

  • MD5

    0967196daa815e116068f696ca939c9c

  • SHA1

    85a8f0755345d641684a2e0952a9d10ecc478d67

  • SHA256

    54b542efa4d9f32f89401cc40283785b7ea729bfcd67c44af15039441e3c097f

  • SHA512

    9618fb564285cd8a3108f3f0060a20f4f53d24a675d2bee99b865af4f8c00fa8df144e6842cd246a8ecca2918b6474d921c7147458fb68d40d6bd1f7c8ef2add

  • SSDEEP

    12288:8KCrbxscrFazRZAuq33Oi4B7+vaziIdAR2u5qcaM/aFGNwnIgRJkm0+vej:8h9rEvTi4B7+CzilYup7c2wpDUUej

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\fd9916fc84093309bed7643c13a15d64e03b2b5a0afdf384ba68cf7fe3e35cd9.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2240-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2240-1-0x0000000073C0D000-0x0000000073C18000-memory.dmp

    Filesize

    44KB

  • memory/2240-124-0x0000000073C0D000-0x0000000073C18000-memory.dmp

    Filesize

    44KB