Windows
Analysis Report
5diately.msg
Overview
General Information
Sample name: | 5diately.msgrenamed because original name is a hash value |
Original sample name: | Fw Item shared with you Unuthrized Lg-In Nticed - Pls Rviw Your Aunt Immdiately.msg |
Analysis ID: | 1580001 |
MD5: | 7f1aa2d6460550f65f31c1ff5d8d26a2 |
SHA1: | 941492c6b390d39fda5b76d7c2c73a621b02ed93 |
SHA256: | e0dc5d2ee93a312d18124bd317fadc22c46400ca3bbdd12c73ffee8fba5b7c4b |
Infos: | |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 1608 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /f "C:\Users \user\Desk top\5diate ly.msg" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 1228 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "7A3 775C4-277D -44C4-968F -1E2607DA7 F13" "841B 4473-A12B- 4E08-A3F9- 32E771B197 5D" "1608" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 1836 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// drive.goog le.com/fil e/d/1ZZpf4 Zlhtjh56EN C16Nv6Bpqz FszHoSg/vi ew?usp=sha ring_eip&t s=676471c2 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 5672 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2104 --fi eld-trial- handle=187 6,i,103245 5952672179 1315,49120 2728342016 3942,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Classification: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Key value created or modified: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File Volume queried: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 21 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 13 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
blobcomments-pa.clients6.google.com | 172.217.18.42 | true | false | high | |
scone-pa.clients6.google.com | 142.250.200.234 | true | false | high | |
play.google.com | 172.217.19.206 | true | false | high | |
plus.l.google.com | 142.251.37.238 | true | false | high | |
drive.google.com | 142.250.200.238 | true | false | high | |
www.google.com | 216.58.211.196 | true | false | high | |
peoplestackwebexperiments-pa.clients6.google.com | 142.250.181.138 | true | false | high | |
online.access.secure001.chase-business.com | 188.119.66.154 | true | false | high | |
apis.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
true | unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.203.238 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.19.206 | play.google.com | United States | 15169 | GOOGLEUS | false | |
142.251.37.170 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.19.142 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.181.138 | peoplestackwebexperiments-pa.clients6.google.com | United States | 15169 | GOOGLEUS | false | |
52.109.68.129 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.251.37.227 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.19.170 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.21.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.37.163 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.201.10 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.18.234 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.21.36 | unknown | United States | 15169 | GOOGLEUS | false | |
188.119.66.154 | online.access.secure001.chase-business.com | Russian Federation | 209499 | FLYNETRU | false | |
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
172.217.19.238 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
2.20.68.229 | unknown | European Union | 37457 | Telkom-InternetZA | false | |
142.250.200.234 | scone-pa.clients6.google.com | United States | 15169 | GOOGLEUS | false | |
172.217.17.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.200.238 | drive.google.com | United States | 15169 | GOOGLEUS | false | |
216.58.211.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
57.150.87.129 | unknown | Belgium | 2686 | ATGS-MMD-ASUS | false | |
142.251.173.84 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.171.195 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.37.238 | plus.l.google.com | United States | 15169 | GOOGLEUS | false | |
172.217.171.234 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.18.42 | blobcomments-pa.clients6.google.com | United States | 15169 | GOOGLEUS | false | |
142.251.37.174 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.181.78 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.201.42 | unknown | United States | 15169 | GOOGLEUS | false | |
52.168.117.168 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.181.74 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580001 |
Start date and time: | 2024-12-23 17:36:31 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | 5diately.msgrenamed because original name is a hash value |
Original Sample Name: | Fw Item shared with you Unuthrized Lg-In Nticed - Pls Rviw Your Aunt Immdiately.msg |
Detection: | MAL |
Classification: | mal56.phis.winMSG@22/14@36/252 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTaskHost.exe
- Excluded IPs from analysis (whitelisted): 52.113.194.132, 52.109.68.129, 2.20.68.229, 2.20.68.223, 52.168.117.168, 172.217.21.35, 172.217.19.238, 142.251.173.84, 142.251.37.170, 172.217.17.46
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: 5diately.msg
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 231348 |
Entropy (8bit): | 4.382181050610794 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9ECB22D11E07433AEC99AA3C3CE61317 |
SHA1: | 36C0E90F0665BB759658A59AC63E38519A3200B5 |
SHA-256: | 94A4DDCC87680A76BD770933D909859778C1C29BFEBEECCC0D3BB92D3F7DF2BA |
SHA-512: | 94B11DB23BCB8A2A502BCBCB8AB278B4FF0696D07AFDD30A4BF33C77E8A00DE28EDABFFB16A99C57755C1B0755B25079511F374BF3EC2EB0F3368FF7D697C431 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 322260 |
Entropy (8bit): | 4.000299760592446 |
Encrypted: | false |
SSDEEP: | |
MD5: | CC90D669144261B198DEAD45AA266572 |
SHA1: | EF164048A8BC8BD3A015CF63E78BDAC720071305 |
SHA-256: | 89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899 |
SHA-512: | 16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.5219280948873624 |
Encrypted: | false |
SSDEEP: | |
MD5: | BF7FC026F510389A24D9C74368E5500C |
SHA1: | 605C69CAF5F44848B1CCFA768D805586EB15CD14 |
SHA-256: | 5363AAD172163EC510792A38FB9E7EBB4BFA45FB1A3A2C77BF26FE76F084C349 |
SHA-512: | 255459638559B9D40C9EE34F862FD5B559547C6BB99226055304E955AC8BE64C3358CC446AAFC4622400B2616D04A593C01A1F78A077A075B5D40DA094BED9E7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4616 |
Entropy (8bit): | 0.13700485453793962 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3D52667FB2DE31829C84D34CC665696B |
SHA1: | 5CF61BA6E781D8B30A4986761B97CABF68869723 |
SHA-256: | 9A934ABC4363DDA10E66DB9C91E14741BF4E00B8E3E59F00CAD7ED7133A6BFD3 |
SHA-512: | AB7BF581EEC7C18CC4438D3439033FDAB2169E90939F90A2E3E7D4071C00720B438A64C2BEF402C54F44D797C946DEFC462E57F4E837556670B696403A1D71FC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2278 |
Entropy (8bit): | 3.8455539376949623 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF3D1F9CE14FEF39C880C78545B45F5C |
SHA1: | F0B6798611EFB3BE1FA68F1D93ADC3E3B0E06420 |
SHA-256: | 92E5A66AEB6606943D961DC3F2C0403BB345D7C8FC640B24B823F215F5DF5C81 |
SHA-512: | 6D08984474A5B40CEF83EF17DF97975E819C949330EACABD18619A04D744BCD237AC461D74F477A101A54E47684625D63DE584FB60588B17A0D022559726EA2C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbres
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2684 |
Entropy (8bit): | 3.9091319199892833 |
Encrypted: | false |
SSDEEP: | |
MD5: | DDC6DF1F23119099BDF6E506C3511D24 |
SHA1: | 1A62AE0C7F5236E183546CC4E14802A8D74146FE |
SHA-256: | 9A06E5E4736E934790554B1AEBE33BF0FE8FB662472349751126FABC133A1E2C |
SHA-512: | 46294F19548E4D51C3188EA12F5D1CCD72207626BE7A3A7298687B87F8118B2AAE22F520D5559144C56C4A226A89408EEC3D8C9C0FD8BB946366373C4FF41E64 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4542 |
Entropy (8bit): | 4.00481185063636 |
Encrypted: | false |
SSDEEP: | |
MD5: | 11322C5EE307708F26D9A8282BFABDA1 |
SHA1: | 662C0394183BEEF729C0C3D752BEC319B20C9000 |
SHA-256: | 5E7CA0B204E4E7949EC4559514355E9A2357A67543994502DFF04346D61A1008 |
SHA-512: | 6978FAA374D66267910138A6B480CE2431F31FCD12681C7EEBD1B84D465918C720B3D30D7BF89986E1FD159D07F46BCB9FF8700A517A42860E695E7656F0634B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1FE472F9B662E0422F87A0F6C7013912 |
SHA1: | 91CE572B4FB7890BC86841BF7F53EF1035BB6B69 |
SHA-256: | 9D05A69342455DC3D7439A6E173A273850A53FD44A35EF493CFE5511FF7FE342 |
SHA-512: | 7E5E401BA7541CCBAB30DD7EB4960DAE4E7E343A75A29729ECC719F51E29C2F74AA504105CE398D863BE275DEF71C47E43DE01EADAC334E9B17363BEA52D86B0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.990164676905255 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1609BA484B410B6E17A36AB11B39AD86 |
SHA1: | 7EE1B707AE9AC4FB204A33B8E0C04D1CA0FB85E7 |
SHA-256: | B8B043733756D309207283F2E236A74D356467544FD64175B27DBC3C0AE7355A |
SHA-512: | EE4684AE998DB1ED0B3C15F4BA622EFD884BA2517C8D40FD3116F3CED28A29A43ECADC3875D036FDB89C07362967007C28EF3BBD696EC3EF2FA039CB73167D00 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.003967136170359 |
Encrypted: | false |
SSDEEP: | |
MD5: | AABBE7CBD73DEB0D2784B34B3272259A |
SHA1: | 805CDB83A4114A6376A36626CDB8341EF18EAB5E |
SHA-256: | 570227BA7645EC6D1A641CC95A7B2B9AC7B6159EBE3FA280C3C701784FE321BD |
SHA-512: | 831D540391CCF8749D24FDEE6B7718372606BD9D4309C938817C86AE88EA671E2B6272C0096C55962ACD07FD5836C84184193247A6666170D0AF746DBF260A8D |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.014289468274292 |
Encrypted: | false |
SSDEEP: | |
MD5: | E6C8F49FE36FF0C982293E95DCF2BBFB |
SHA1: | C43636C6FEE3EA5FCCF3C3A35DE4595FDFE99657 |
SHA-256: | 5E55335F6020CCF943711F7A7403CA88FCC20586ED214941BF963C09C3CF1DB6 |
SHA-512: | DA6182D19D517358D379BA51E55A612F158034EA826D537BE085D1AFD31C81EF7AE216824217310EECE52F6F35BD27FB72C6EE2605DCA200B8D043A0C6353DED |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.004097932121071 |
Encrypted: | false |
SSDEEP: | |
MD5: | 993FFB92EF69FE36E08209949B1C1036 |
SHA1: | EEE88DD334E34A7D7FD4A923645B78D044B496CE |
SHA-256: | 0F0CD63B2986CA8F64FFC1FF246D62DF63C6F20D7EF8D0082730E0CFE2D780EA |
SHA-512: | F0F48EF672834F80908533AB5E14BBF35B8D440E7D668FB3CD90A17FEA68852ED5CB35E836CA2B81777014E26D57076C49493C92B6560EE26220A01F45158E99 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9916818949624813 |
Encrypted: | false |
SSDEEP: | |
MD5: | C04804BAB34522BD349128FDF6D48310 |
SHA1: | 7F4B2D8409188B657149C07F754B328355FAAF60 |
SHA-256: | 64A8DA9150C10F7F852C3B98B439CB5030D1F884AD346D819D738AA3EE40ABA9 |
SHA-512: | DB70F3BF46BFDC5D099D6BE5DCB3EAE71E59A6A08097EF957D30D2D216EC1A44C6DCFB1D35F07FEAD4FBD971637534FBABEC437F614B82C95E526A7BA0521C80 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.001560932721731 |
Encrypted: | false |
SSDEEP: | |
MD5: | 855989CE3780FC0DEA191EF0109D5B75 |
SHA1: | 19E543F5E3E3B47616E2DB4EE6E99A45ACE6E642 |
SHA-256: | 29AD33EF4D26EC9ADC01B60F92B752760BE34B50A04473E181373C4C3B5F0315 |
SHA-512: | ADE19B08EE3F4089E51C7BBFA2B8C1FDCEB98005E76444A8B98A4CD9E7B23B90AF35B010E26C8B9B6638C34B6E96A0D19902C0888C755DD745C871F69B0B326E |
Malicious: | false |
Reputation: | unknown |
Preview: |
File type: | |
Entropy (8bit): | 4.120160863822686 |
TrID: |
|
File name: | 5diately.msg |
File size: | 92'672 bytes |
MD5: | 7f1aa2d6460550f65f31c1ff5d8d26a2 |
SHA1: | 941492c6b390d39fda5b76d7c2c73a621b02ed93 |
SHA256: | e0dc5d2ee93a312d18124bd317fadc22c46400ca3bbdd12c73ffee8fba5b7c4b |
SHA512: | ba045da4f3beaa3039a8a8e5b13e0a70b141ba169cf94fefc5f301607aa81f2cb682ceda957ca3632f8f21729a91b7612a7dba33806ed4b108c616fc90a98fb5 |
SSDEEP: | 1536:sfBKaRLoRnrQKtTVlSMVWi5WgWeUNoYrsEm43FSECMHKeK1:bwoRnrQKZVlN9UNoYrsEmYFSEFKeK1 |
TLSH: | 7C93DB253AFA0219F2B79F3559F290939937BC92AD35CA4F2195330E0A73941DC61B3B |
File Content Preview: | ........................>.......................................................h.............................................................................................................................................................................. |
Subject: | Fw: Item shared with you: "Unuthrized Lg-In Nticed - Pls Rviw Your Aunt Immdiately" |
From: | Rhonny Rowden <rhonny@eligibilitytrackingcalculators.com> |
To: | CoreRecon Support <support@corerecon.com> |
Cc: | |
BCC: | |
Date: | Thu, 19 Dec 2024 22:44:06 +0100 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Received | from SA1P221MB1548.NAMP221.PROD.OUTLOOK.COM ([2603:1036:305:4966::5]) |
21 | 44:13 +0000 |
by SA3PR11MB7488.namprd11.prod.outlook.com (2603 | 10b6:806:313::12) with |
2024 21 | 44:10 +0000 |
(2603 | 10b6:806:27::15) with Microsoft SMTP Server (version=TLS1_3, |
19 Dec 2024 21 | 44:10 +0000 |
Authentication-Results | spf=pass (sender IP is 209.85.167.175) |
Received-SPF | Pass (protection.outlook.com: domain of |
via Frontend Transport; Thu, 19 Dec 2024 21 | 44:10 +0000 |
for <support@corerecon.com>; Thu, 19 Dec 2024 13 | 44:10 -0800 (PST) |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; |
h=content-language | mime-version:msip_labels:accept-language |
message-id:reply-to; | |
X-Google-DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; |
X-Gm-Message-State | AOJu0YxDhdxQOJTI6/rMX9ENqGare7fpoBsEcpDhK1KXGApRRb6knWB4 |
X-Gm-Gg | ASbGnctjef26hHJJUWYkePUuC2AvU+OU//C68OQVRZ0fX4motUuGIlRl5sIOfGy1pw6 |
X-Google-Smtp-Source | AGHT+IFf+0UMm/di3cgUFaAHadjEvjfRLK/Bq0kfDppx0ZS/cVDo6C/Hk4sUnVZ2uQWZg84BbyM0xw== |
X-Received | by 2002:a05:6808:2183:b0:3eb:63c9:fe7f with SMTP id 5614622812f47-3ed890e3c2emr178235b6e.40.1734644649216; |
Thu, 19 Dec 2024 13 | 44:08 -0800 (PST) |
Return-Path | rhonny@eligibilitytrackingcalculators.com |
From | Rhonny Rowden <rhonny@eligibilitytrackingcalculators.com> |
To | CoreRecon Support <support@corerecon.com> |
Subject | =?utf-8?B?Rnc6IEl0ZW0gc2hhcmVkIHdpdGggeW91OiAiVW7QsHV0aNC+cml6ZWQgTNC+?= |
Thread-Topic | =?utf-8?B?SXRlbSBzaGFyZWQgd2l0aCB5b3U6ICJVbtCwdXRo0L5yaXplZCBM0L5nLUlu?= |
Thread-Index | AWEyYjQwoxFOqRlN1Gzxn+8xVYM+IWI5NC0t8S4wGV0= |
X-MS-Exchange-MessageSentRepresentingType | 1 |
Date | Thu, 19 Dec 2024 21:44:06 +0000 |
Message-ID | <SA1P221MB15480EAA65EF66D7E875FD3AAD062@SA1P221MB1548.NAMP221.PROD.OUTLOOK.COM> |
References | <93ecdad0-e2e7-405a-aab0-02a92196c2ea@docs-share.google.com> |
In-Reply-To | <autogen-java-bc4c0cef-403e-4be4-ba87-e098d6106bab@google.com> |
Accept-Language | en-US |
X-MS-Has-Attach | X-MS-TNEF-Correlator: |
msip_labels | MIME-Version: 1.0 |
Content-Language | en-US |
Content-Type | multipart/alternative; |
X-MS-Exchange-Organization-ExpirationStartTime | 19 Dec 2024 21:44:10.4635 |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | 6d8f0693-adab-4070-ad23-08dd207645bb |
X-EOPAttributedMessage | 0 |
X-EOPTenantAttributedMessage | fd95b4e8-ccc7-4e27-b8dc-ec4c54e4a14d:0 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | SA2PEPF00003AE9:EE_|SA3PR11MB7488:EE_|IA1PR11MB6291:EE_ |
X-MS-Exchange-Organization-AuthSource | SA2PEPF00003AE9.namprd02.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Office365-Filtering-Correlation-Id | 6d8f0693-adab-4070-ad23-08dd207645bb |
X-MS-Exchange-Organization-SCL | 1 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|43022699015|1032899013|69100299015|2066899003|8096899003; |
X-Forefront-Antispam-Report | CIP:209.85.167.175;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail-oi1-f175.google.com;PTR:mail-oi1-f175.google.com;CAT:NONE;SFS:(13230040)(43022699015)(1032899013)(69100299015)(2066899003)(8096899003);DIR:INB; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 19 Dec 2024 21:44:10.3541 |
X-MS-Exchange-CrossTenant-Network-Message-Id | 6d8f0693-adab-4070-ad23-08dd207645bb |
X-MS-Exchange-CrossTenant-Id | fd95b4e8-ccc7-4e27-b8dc-ec4c54e4a14d |
X-MS-Exchange-CrossTenant-AuthSource | SA2PEPF00003AE9.namprd02.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | SA3PR11MB7488 |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:03.0618079 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8272.000 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003); |
X-Microsoft-Antispam-Message-Info | =?us-ascii?Q?mFWdQ646Pn9fl/aWHcYzL4iOB/KDLHY8CbOZnHEdHXvAecRYGjWGVa6iguBE?= |
date | Thu, 19 Dec 2024 22:44:06 +0100 |
Icon Hash: | c4e1928eacb280a2 |