Windows
Analysis Report
original.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w11x64_office
- OpenWith.exe (PID: 3352 cmdline:
C:\Windows \system32\ OpenWith.e xe -Embedd ing MD5: 2FBBFE3E8211307BC4124357A9A9951B)
- cleanup
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | Classification label: |
Source: | File read: |
Source: | Key opened: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Key value created or modified: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 21 Browser Extensions | 1 DLL Side-Loading | 1 Modify Registry | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 11 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true | false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1590925 |
Start date and time: | 2025-01-14 15:39:22 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | original.eml |
Detection: | MAL |
Classification: | mal48.winEML@1/0@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtEnumerateKey calls found.
- Report size getting too big, too many NtOpenKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
File type: | |
Entropy (8bit): | 6.047194286417916 |
TrID: |
|
File name: | original.eml |
File size: | 243'555 bytes |
MD5: | 96c43f66e14e2fa5782d19584b26f335 |
SHA1: | 3e56151ad9584754141986f6374fac15afe157e0 |
SHA256: | 44c374171a3dfc7380266297d4952b51e3c81980fdcf9c17b8a61278198fffca |
SHA512: | 0790b3e18b9d5de82245545286cf8bcb60ddfcd05b5299be51fbdb9414c7fc6f27a8b5dd81cc536f6ff67a62c1f4094092cf2905b40b4a4ae66658cec66295be |
SSDEEP: | 6144:h4ISuDv4U4ArXuT4PVNR58c4cdX9OiZxdlyeghmUpd0gFs/Xz:h4IShAXu0Vp4AgiZxfyegP2z |
TLSH: | E534CE37938029A4CB55492BD017767E3FB41BC7CDB128FD279ABE2B978CCB29194148 |
File Content Preview: | Return-Path: <dany.ratte@metalus.qc.ca>..Received: from YT3PR01CU008.outbound.protection.outlook.com (mail-canadacentralazon11020103.outbound.protection.outlook.com [52.101.189.103]).. by inbound-smtp.us-east-1.amazonaws.com with SMTP id 4ipabbfal85lj03ot |
Subject: | [Phish Alert] BT154296 Rapport |
From: | Dany Ratte <dany.ratte@metalus.qc.ca> |
To: | "c9025caf-ebfb-4a55-8a88-3cf1915dac7c@ca.phisher.knowbe4.com" <c9025caf-ebfb-4a55-8a88-3cf1915dac7c@ca.phisher.knowbe4.com> |
Cc: | |
BCC: | |
Date: | Tue, 14 Jan 2025 14:24:57 +0000 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
Return-Path | <dany.ratte@metalus.qc.ca> |
Received | from YT2PR01MB5902.CANPRD01.PROD.OUTLOOK.COM ([fe80::7c97:a276:a7af:a379]) by YT2PR01MB5902.CANPRD01.PROD.OUTLOOK.COM ([fe80::7c97:a276:a7af:a379%3]) with mapi id 15.20.8356.010; Tue, 14 Jan 2025 14:24:57 +0000 |
Received-SPF | pass (spfCheck: domain of metalus.qc.ca designates 52.101.189.103 as permitted sender) client-ip=52.101.189.103; envelope-from=dany.ratte@metalus.qc.ca; helo=YT3PR01CU008.outbound.protection.outlook.com; |
Authentication-Results | amazonses.com; spf=pass (spfCheck: domain of metalus.qc.ca designates 52.101.189.103 as permitted sender) client-ip=52.101.189.103; envelope-from=dany.ratte@metalus.qc.ca; helo=YT3PR01CU008.outbound.protection.outlook.com; dkim=pass header.i=@metalusinc.onmicrosoft.com; dmarc=pass header.from=metalus.qc.ca; |
X-SES-RECEIPT | AEFBQUFBQUFBQUFHOEJJUFYzRGdUbllNKzAyd01zYktMek12RGZmK1Y4RWdUZnpzQlhZdzlWOUhhQjRzSTVubFIyOEVwMXgvUjR0aHdkbnJXYnU1S0o1RUl4emczaW5hcXpZQXdBK2d5TzBBQ0J2UWwwT1ROT0dVcWhPRVh5clErRnpicWhIYWJDdnNaQ1hnTlpYSG5XRHdLSEF3WWY2dXRjd1I4cjd0RFN6UndTWkd1M2I5V2FvUStLM2M2K252VzE5WXVieUNkRU5VSGZxemV0NGI2TkMvekZPTFhmdGFlRWsrVnN1Wkg0bTJIRzJGQkZMazBtSlpzOUVDZjlOTnZab1JRUkJjZmFMY0hjUzhpbTVtQUk2bXZUejgyck84eURQdXQwYnVpRWQ5cE1GempMdW9sMEd2eEJ2aHdQR0ZHeFVGa3g4Z3RmV3c9 |
X-SES-DKIM-SIGNATURE | a=rsa-sha256; q=dns/txt; b=a/HwiU/9Q2iVkMK+VNMVQNgZ01t9vohBrpXbuQcZ9wiypqc3W6NU5ySAc4Sr2RPq1dolZUhBssVJ7p8XreRo3GL7BgoFt7MBZXtANJwe0yC1GK0JaIQVjWGOUmnIqeCNcjwgBxzB5QoAvJkn4joEmTN/w5yIeZF5eIcud+UFr4U=; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1736864700; v=1; bh=t9kFyp28PrA5e3fk1kxLQvNefk4qwS57j8ftKdOH3QM=; h=From:To:Cc:Bcc:Subject:Date:Message-ID:MIME-Version:Content-Type:X-SES-RECEIPT; |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=El0G4FvrH760NU28wmyNovNH0lU6fLgXZlbPPwNVc/uaOuoO0FW69KI8R0hZmHD0D5KU6sBL+8f7y5hhTE5ULqCFGcFh5Zulm+1RYA14JtuAFKesV057zQBN2apxleXd9TdPTnug1XsFO9xSZwsN7cwHY0bTq9BWcRTM+9TPtSjgzhKCKtAHm/z90fOvZz0Yt80pv0nTyhxMxcGVCnNhm/il+btt3tHS6lE79tzQv4wUSmrMYVrzcijhGlPbYHRp31Qa6X76y/g7+xblHVCn2EIzmCf8ROZIZ9MjQd9lnmL5KUd7aTyEB09cHzPx/WD/wr+5q3JG+B/A8Inh7+Lj5A== |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TTvxgXKer2vt3XR3QBQ2lY0QCes2bNnZ1xyXDUZyLfw=; b=KMf9/MyQecVbmIUiF06jW3cArGeWsRNIJK4Ya8hfMpvYNPSjI4pLYXkSLhB6yzF2B+k6+eHeqN8zeSWdHRT/0Zhedyt6Ojqt8Noxo5ISfyWnEO4PywixjWE1tsujgR5qCe3iiysra8Hr1S3gIOdJ5nwRNa4Nf4TH6EOsXXJ56OTfBxpPF2vW8uE+v9nL8jjyC6lpQhfjrhROXTvw6BYMBmDBvxO6dhRoqTrrd+wAL3nR2qtwZR5B1AvBv3vzrfeztoXOdbnu97wzUXebKKMzztE/KTvTFL/E1Z01CVTQQLYFv6odgeiI9HApGnP06XsLcaKWCXXMOAJfY6sypUNuzw== |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=metalus.qc.ca; dmarc=pass action=none header.from=metalus.qc.ca; dkim=pass header.d=metalus.qc.ca; arc=none |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=metalusinc.onmicrosoft.com; s=selector1-metalusinc-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TTvxgXKer2vt3XR3QBQ2lY0QCes2bNnZ1xyXDUZyLfw=; b=ZoXXaANQ7dGqf0efAYt1YGblpEzpD1pHwD4X0novC7z1wqRFmAs5jaBgWxnKy5Tg//d+V3eLBYOjWKVzc56M4t16vMGw8QlwFIzLt6t/3omSHU5nuf6u6/50XKIbPba10neNanV+BenNc3KdXRb0oD12P+u2rF9PBX5o3bAMYW0= |
From | Dany Ratte <dany.ratte@metalus.qc.ca> |
To | "c9025caf-ebfb-4a55-8a88-3cf1915dac7c@ca.phisher.knowbe4.com" <c9025caf-ebfb-4a55-8a88-3cf1915dac7c@ca.phisher.knowbe4.com> |
Subject | [Phish Alert] BT154296 Rapport |
Thread-Topic | [Phish Alert] BT154296 Rapport |
Thread-Index | AQHbZomhBVA7VOSlu0GGLkLPjHc6OLMWUxnb |
Date | Tue, 14 Jan 2025 14:24:57 +0000 |
Message-ID | <YT2PR01MB5902B2566F657096A055BC3AD7182@YT2PR01MB5902.CANPRD01.PROD.OUTLOOK.COM> |
References | <321142741700100.1736519291.417025327682495-openerp-166767-project.task@ampv177> <213102271628307.1736861886.346633911132812-openerp-166767-project.task@ampv177> <213102271628307.1736861886.346633911132812-openerp-166767-project.task@ampv177> |
In-Reply-To | <213102271628307.1736861886.346633911132812-openerp-166767-project.task@ampv177> |
Accept-Language | fr-FR, en-US |
Content-Language | en-US |
X-MS-Has-Attach | yes |
X-MS-TNEF-Correlator | |
authentication-results | dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=metalus.qc.ca; |
x-ms-publictraffictype | |
x-ms-traffictypediagnostic | YT2PR01MB5902:EE_|YT2PR01MB8261:EE_ |
x-ms-office365-filtering-correlation-id | e2b568eb-63a8-48bd-4559-08dd34a73901 |
x-ms-exchange-atpmessageproperties | SA |
x-ms-exchange-senderadcheck | 1 |
x-ms-exchange-antispam-relay | 0 |
x-microsoft-antispam | BCL:0;ARA:13230040|69100299015|376014|1800799024|366016|8096899003|38070700018; |
x-microsoft-antispam-message-info | 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 |
x-forefront-antispam-report | CIP:255.255.255.255;CTRY:;LANG:fr;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:YT2PR01MB5902.CANPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(69100299015)(376014)(1800799024)(366016)(8096899003)(38070700018);DIR:OUT;SFP:1102; |
x-ms-exchange-antispam-messagedata-chunkcount | 1 |
x-ms-exchange-antispam-messagedata-0 | RiZCk2rOMJ5lZnrVs1WFZ46BrmJGRgEu1bktH0qMGcH78JDthdHr48LsO8/0uETCpvvxep4Da8FvQUxp9RSr/9z5jY+CPiReA9cb1o6Ej8ujOML4tQZyLnggedkJt+DXOAZWUsML7ZwNVlfkzVVCQZ6jJ7w9GRl5QlqK8MlFUQslvDWokIXlYc54arbfd+FE4X34MXR7TIoC5PiV6UkUC0B0DT9t3pAfIgUVrP5XLHONEctN5ZgtIXGDTDm9Zs3XfTExrSDuO1DSFBecgqzO7FjIk8CVHbYEJOGs71MvfpaW8y92ZFvvY8hGW18ODS09dz5eT1Fezdt0WDL4oc8k8Cdu9PJhn8gdrz07o2d6fvHRUf/HQUYqN4UHubAis5MVg/eppW5DjTB+UtwYJ3vPwYmY0yLhyeocbWETTzHfjZQQ4czTf67kIgwUjxyWXc9d3tIlfCqMFZjKFR01Wr3FCDxy5kQjrLtCQ4h8ERzQAPh1H2O4MTDA9aljySA3SkRU1GknpX4cReBLMs9uwmvZTxUbFLCsZU6F7OvCyURk9iJjzxdr6lNDFAWvNDns3HdMzWZS4pgnR8fUD4vkleZRBkPdO8DfHb2MwL83mHFtF5j6Sq8CrIHoNIhkzuDlenmX34QioFiA3nVsQaYmgs/MdNFCig2/IBlmK+GFmwu53Wwp72q3PxN2I3Z0avpEXJ7F9nBM16ZBOSLxqlfh4yHPp/ME8ur0jzrMXASWHk5U/Z0vlP81RlLphphz+OW0PHAWucK+BXvIJ29aFoSrN+ar+u1bZWfm+hXphAsvvNmhT76yz7WPTgIEliPAoQx9ImoMGhX9No5+4lNWNBTYa0+qL53gGoxw6DmgGMPZLFrsGh0QjNfhtXJx1nzOR4aolRFXMRPtCYWUdP10ktlTw7h71XWZaal9lv85jMqipVWx/aPfLDkHR0haFYUAjsW/cunq17VwKSTIx6Mf6qX9sEk5RA2DZLqG9za1GuZpWvbE4wpIXmAN1EPizWX8BreW9YUOm9k2yc7MZIyyE8E0+LRKkvApqccqdF8H39FeyBjcyQBreZR9Dg53Gj65KtZ/AfK2JAVb7qegAKoLqe+RCd6JUPQ9Dzn8BLFQ4RV818T2lyo8PpZgcUeiv4ZJSjG379xy3HLbnmb7pZUAx4r/cSMFpipsWzDMaWSEkGEGXZzTZnv9ZbDahnyKXXopiBd5QNFvwH3zCxBONX9GSqw1A7nov8C4T/TBU/foBUbMpb35YnVo0DLDvqs6wsFeDS61DQBN70DUh0Krbwdu+lyJxV66OX0e5o2VfS3FeA8NQxc9tfjERv4Jp3IOaqY+DqGpG/rciLL+1uSpatyhr/WVg674nftOQB2maf6fsrXP7A6DQ4NAnsJWw671tVRPjY0DpbNxgeVFWAiDrfe/QI6oXVQQ6hLFObuof/EDk/w1cJ823TRI3oK0c59F6opVZcTtipNvspsBSH34phlOdPKuBF9bGzzWQxhv5Pg30LMHGWtxxNxuJI4v2sRikY0Kex/j1H5Butw3WtrPDPS8yMltp7s+DQekVsKA/CVMn2J7VCWQqs+R/F0nMB1J9tZtREKKbEHY |
Content-Type | multipart/mixed; boundary="_005_YT2PR01MB5902B2566F657096A055BC3AD7182YT2PR01MB5902CANP_" |
MIME-Version | 1.0 |
X-OriginatorOrg | metalus.qc.ca |
X-MS-Exchange-CrossTenant-AuthAs | Internal |
X-MS-Exchange-CrossTenant-AuthSource | YT2PR01MB5902.CANPRD01.PROD.OUTLOOK.COM |
X-MS-Exchange-CrossTenant-Network-Message-Id | e2b568eb-63a8-48bd-4559-08dd34a73901 |
X-MS-Exchange-CrossTenant-originalarrivaltime | 14 Jan 2025 14:24:57.6486 (UTC) |
X-MS-Exchange-CrossTenant-fromentityheader | Hosted |
X-MS-Exchange-CrossTenant-id | 4f85cc14-eaa8-4e0b-8291-93aab6969f78 |
X-MS-Exchange-CrossTenant-mailboxtype | HOSTED |
X-MS-Exchange-CrossTenant-userprincipalname | J+sxeTeNY4LpToO6eFGPQYdgqL+S0PDgIu9QPdBFa7nDqZIWO5itjefT4ynlUe8lt8oZdHgjBjx3367P/jCyH2k7DSv5vhVcSKDaNf2bC2k= |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | YT2PR01MB8261 |
Icon Hash: | 36f4b282a2a28082 |