Windows
Analysis Report
Payment Advice Note from 25.03.2025.msg
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
OUTLOOK.EXE (PID: 9064 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /f "C:\Users \user\Desk top\Paymen t Advice N ote from 2 5.03.2025. msg" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 8812 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "2AA FF37D-449B -4AD7-B904 -E9901A854 2B5" "800E 699A-EB5E- 43CF-862C- 2F1D207B98 1C" "9064" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
- • Phishing
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 11 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-0005.dual-s-msedge.net | 52.123.128.14 | true | false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1648770 |
Start date and time: | 2025-03-26 07:45:20 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Payment Advice Note from 25.03.2025.msg |
Detection: | MAL |
Classification: | mal48.winMSG@3/4@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, B ackgroundTransferHost.exe, WMI ADAP.exe, SIHClient.exe, backg roundTaskHost.exe, conhost.exe , svchost.exe - Excluded IPs from analysis (wh
itelisted): 52.109.8.89, 52.18 2.141.63, 52.149.20.212, 52.12 3.128.14, 150.171.31.254, 2.23 .227.208, 20.96.153.111, 204.7 9.197.222, 150.171.28.10, 23.3 3.40.139, 4.245.163.56 - Excluded domains from analysis
(whitelisted): www.bing.com, fp.msedge.net, ecs.office.com, ev2-ring.msedge.net, slscr.up date.microsoft.com, prod.confi gsvc1.live.com.akadns.net, ctl dl.windowsupdate.com, cus-conf ig.officeapps.live.com, g.bing .com, arc.msn.com, mobile.even ts.data.microsoft.com, fe3cr.d elivery.mp.microsoft.com, dual -s-0005-office.config.skype.co m, config.officeapps.live.com, us.configsvc1.live.com.akadns .net, officeclient.microsoft.c om, ecs.office.trafficmanager. net, mobile.events.data.traffi cmanager.net, onedscolprdcus01 .centralus.cloudapp.azure.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 94208 |
Entropy (8bit): | 4.470539971563455 |
Encrypted: | false |
SSDEEP: | 1536:jx47B9YrKUXIXo3/yvQvYekbRHCiIOLtow8fkxzlN/Ev1hY2nlJ+:N47BmrK2IXox+ |
MD5: | 21922FD3FF46FBA73A1D8F1B33A87D5F |
SHA1: | FD9994FAA192EB7F8C25414BAD04A1701C675F8D |
SHA-256: | F1D06E80825607E48C7F138B8F0D61F64EF436C5AE9BEC0576F60798D716DDDA |
SHA-512: | 1E4DCE6D293A9D92300FBF7FE4B680845C31DBD2DE533B14A4980C18A01764032D9607D398784367231F3F5698BC29C34E4EA92FCDC406D26DE3568D961724F5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 163840 |
Entropy (8bit): | 0.37951419118514335 |
Encrypted: | false |
SSDEEP: | 192:JTlVhovPwdfAfHyK1ETJfkn4Mu4rcn5NgiXHWQOoqAbAFAqwNh/:JT7hvAfyRJM4Mu4I8iXHOoqMu |
MD5: | 5939A710C684792E77D0C9FB1F5B62AF |
SHA1: | BA42A5F81AD86C7600E521EB4ADC0CA8A9C2AF00 |
SHA-256: | 29198EE4A306E1234B5B1D2F9E16A5A15472157651376220BC154284DA07E262 |
SHA-512: | B7C92615F70F5693C1F61CBFB4AF382DF43AC1DA26C9A4C7B26A2A99639F5418388BC572D89160869F409BEEA14228699CEFB345E0296EC7C8D607F734DC044E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 1.3007625714890005 |
Encrypted: | false |
SSDEEP: | 768:X4QcBKwAe3Q4LMYK8TSmrArCJFpi4cBfJblG02xu3o8BUTIZ:cH3fnFS7OJqlfAuYeNZ |
MD5: | 1F33CAE1A3AF902C5B109802262F7679 |
SHA1: | ACB478C8853698E738E3CA9F03EBFAD0C569D867 |
SHA-256: | F33460DC60071D4E47B2EAE9049A848B0FC25DA0876D6884812AA6977DEB77B9 |
SHA-512: | 81607CFD68E45524578D793BF18997DAE672E62981B92BC43347C1EB4A0B835E9E1AFF5503898203FAF46D295688E53341298BCFDA320D2E1F6D4B7E9C14CCD0 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.9708137879266469 |
Encrypted: | false |
SSDEEP: | 384:WOjTIXJ2DeQjqH3Vjz8z7IZiDS9jURP6Hs:pTIZ2di3VvIMZAS+RA |
MD5: | 971B0393D78FA3878C18B709034E615B |
SHA1: | EAFF11F3201D0E02DE38D7097C7286C735EA7CCE |
SHA-256: | 5F2F912B68844BF29EBC7BA34CB397B9F9A50798B1E4AE9C685083103C593A74 |
SHA-512: | E83F1551989B1FE5675BCA3878C1357F5DD27A6B990E96AFD1AA642E1F57655CF4B1A580CA5480636E271CDA2D23877187191B2066F0B7A2861388FEDA585497 |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.402436356648218 |
TrID: |
|
File name: | Payment Advice Note from 25.03.2025.msg |
File size: | 115'200 bytes |
MD5: | 7592ff5d716ab04452e26980d1bdf81d |
SHA1: | e76d4abafda9f38c34d16aeefa61f829f3683033 |
SHA256: | 74a7cdb35b270f276f107aa6dfeb2a1edbe80db15c935110cd11a7099c77c368 |
SHA512: | db597e7d5fe593dd25c2da43fe6a2299127e66b97291179a2a5673b84a2348d68db945ae8ddd3355c776758e05decc9b2b2d384067d1a7402807d120385203c8 |
SSDEEP: | 3072:Y0LdhEVgAyhG83mUETeL8zvASQycsWRYOwq+t94Tg:p7AUqcsfOwqTT |
TLSH: | 9BB31A443AFA4614F677AFF60DE1B04785363C91BC21868F3968330F0A75D85AA62B5F |
File Content Preview: | ........................>.......................................................}.............................................................................................................................................................................. |
Subject: | Payment Advice Note from 25.03.2025 |
From: | NOREPLY <noreply@lenmed.co.za> |
To: | <info@dataprime.co.za> |
Cc: | |
BCC: | |
Date: | Tue, 25 Mar 2025 14:27:32 +0100 |
Communications: | |
Attachments: |
|
Key | Value |
---|---|
Received | from LENMED.CO.ZA (vc-vb-41-21-200-252.ens.vodacom.co.za |
(2603 | 10a6:10:4b7::22) with Microsoft SMTP Server (version=TLS1_3, |
2025 13 | 31:00 +0000 |
25 Mar 2025 13 | 30:59 +0000 |
Authentication-Results | spf=pass (sender IP is 41.74.205.145) |
Received-SPF | Pass (protection.outlook.com: domain of lenmed.co.za designates |
via Frontend Transport; Tue, 25 Mar 2025 13 | 30:59 +0000 |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=lenmed.co.za; |
h=from | from:reply-to:subject:subject:date:date:message-id:message-id: |
to | to:cc:mime-version:mime-version:content-type:content-type: |
content-transfer-encoding | content-transfer-encoding; |
za-mta-24-HotZRxAYMjWVaeozOIwE6A-1; Tue, 25 Mar 2025 15 | 30:55 +0200 |
X-MC-Unique | HotZRxAYMjWVaeozOIwE6A-1 |
X-Mimecast-MFC-AGG-ID | HotZRxAYMjWVaeozOIwE6A_1742909454 |
Date | Tue, 25 Mar 2025 15:27:32 +0200 (CAT) |
From | NOREPLY <noreply@lenmed.co.za> |
Subject | Payment Advice Note from 25.03.2025 |
To | <info@dataprime.co.za> |
Message-ID | <ADR5000000016547330000505685D0BC1FD082AFABFECA13B425@LENMED.CO.ZA> |
MIME-Version | 1.0 |
Importance | Normal |
X-Priority | 3 (Normal) |
X-Mailer | SAP NetWeaver 740 |
X-Mimecast-Spam-Score | 0 |
X-Mimecast-MFC-PROC-ID | NV0Ev7T70SXvzCDLCTbEajBwEsgQlBh6XM64tq-LiSo_1742909454 |
X-Mimecast-Originator | lenmed.co.za |
Content-Type | application/pdf; |
Content-Transfer-Encoding | base64 |
Content-Description | Payment Advice Note from 25.03.2025 |
Return-Path | noreply@lenmed.co.za |
X-MS-Exchange-Organization-ExpirationStartTime | 25 Mar 2025 13:31:00.4052 |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | 83eda0cb-8b51-45de-199b-08dd6ba14857 |
X-EOPAttributedMessage | 0 |
X-EOPTenantAttributedMessage | 9a48e0d0-b340-4d47-b81c-14a44c7c076a:0 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | DB1PEPF000509E5:EE_|GV1PR02MB10719:EE_ |
X-MS-Exchange-Organization-AuthSource | DB1PEPF000509E5.eurprd03.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Office365-Filtering-Correlation-Id | 83eda0cb-8b51-45de-199b-08dd6ba14857 |
X-LD-Processed | 9a48e0d0-b340-4d47-b81c-14a44c7c076a,ExtFwd |
X-MS-Exchange-AtpMessageProperties | SA|SL |
date | Tue, 25 Mar 2025 14:27:32 +0100 |
Icon Hash: | c4e1928eacb280a2 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 26, 2025 07:46:34.155090094 CET | 1.1.1.1 | 192.168.2.5 | 0x62ea | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 26, 2025 07:46:34.155090094 CET | 1.1.1.1 | 192.168.2.5 | 0x62ea | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false | ||
Mar 26, 2025 07:46:34.155090094 CET | 1.1.1.1 | 192.168.2.5 | 0x62ea | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 02:46:26 |
Start date: | 26/03/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x290000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 5 |
Start time: | 02:46:33 |
Start date: | 26/03/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7361b0000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |