Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abr

Overview

General Information

Sample name:OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abr
(renamed file extension from etl to abr)
Original sample name:OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.etl
Analysis ID:1561390
MD5:04408776aa05de510f91a5070fde5a14
SHA1:d04f705b894fc73e671e9e58409b9f188f7a7fc3
SHA256:213721989462341861fc1bb310a096945dd305138a07c4977c97375b86acc952

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64
  • OpenWith.exe (PID: 5928 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrString found in binary or memory: https://outlook.office.com/api/v2.0/Me/Activities
Source: OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrString found in binary or memory: https://outlook.office.com/api/v2.0/Me/ActivitiesW
Source: OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrString found in binary or memory: https://outlook.office365.com/mapi/emsmdb/?MailboxId=23007297-057d-4fbe-8942-10d7a78ee01f
Source: OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrString found in binary or memory: https://outlook.office365.com/mapi/emsmdb/?MailboxId=c02ffe65-ec5d-4c32-8c23-00450e456bf7
Source: OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrString found in binary or memory: https://outlook.office365.com/mapi/nspi/?MailboxId=23007297-057d-4fbe-8942-10d7a78ee01f
Source: classification engineClassification label: clean1.winABR@1/0@0/0
Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5928:120:WilError_03
Source: C:\Windows\System32\OpenWith.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\OpenWith.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: tiledatarepository.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepository.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrStatic file information: File size 52428800 > 1048576
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://outlook.office365.com/mapi/nspi/?MailboxId=23007297-057d-4fbe-8942-10d7a78ee01fOUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrfalse
    high
    https://outlook.office.com/api/v2.0/Me/ActivitiesWOUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrfalse
      high
      https://outlook.office.com/api/v2.0/Me/ActivitiesOUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrfalse
        high
        https://outlook.office365.com/mapi/emsmdb/?MailboxId=c02ffe65-ec5d-4c32-8c23-00450e456bf7OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrfalse
          high
          https://outlook.office365.com/mapi/emsmdb/?MailboxId=23007297-057d-4fbe-8942-10d7a78ee01fOUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abrfalse
            high
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1561390
            Start date and time:2024-11-23 10:05:57 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 14s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:6
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abr
            (renamed file extension from etl to abr)
            Original Sample Name:OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.etl
            Detection:CLEAN
            Classification:clean1.winABR@1/0@0/0
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            04:06:47API Interceptor1x Sleep call for process: OpenWith.exe modified
            No context
            No context
            No context
            No context
            No context
            No created / dropped files found
            File type:data
            Entropy (8bit):4.443540165941702
            TrID:
            • Adobe PhotoShop Brush (1003/3) 97.47%
            • Sybase iAnywhere database files (19/3) 1.85%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.68%
            File name:OUTLOOK_16_0_18129_20158-20241121T1955450008-16720.abr
            File size:52'428'800 bytes
            MD5:04408776aa05de510f91a5070fde5a14
            SHA1:d04f705b894fc73e671e9e58409b9f188f7a7fc3
            SHA256:213721989462341861fc1bb310a096945dd305138a07c4977c97375b86acc952
            SHA512:5c71e00d70da7dbd6c50cc27d6537062c9ef2c2861122739ebbc4b5e5626da7f51975c24c904f7c116fd45e4be0c3fc27441e9c2f226c23a7dd9693b43a2028b
            SSDEEP:49152:ARLUjwpTpotG/wNFFKqvyVwFWiSTA7ko5YNg3W0lygt+CZ:ARLxluA/wjYVwFWiSTA7FZ3W4znZ
            TLSH:0DB727345C5B3AE3C054DA348AF17AEEEB108DAE18D59D2A42CF72624673712DEC3D16
            File Content Preview:............................................................................r....@..PA.....By<..................gX..............Zb..2...........................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2..............................................
            Icon Hash:72e2a2a292a2a2b2
            No network behavior found

            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:04:06:47
            Start date:23/11/2024
            Path:C:\Windows\System32\OpenWith.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\OpenWith.exe -Embedding
            Imagebase:0x7ff785870000
            File size:123'984 bytes
            MD5 hash:E4A834784FA08C17D47A1E72429C5109
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            No disassembly