Managed XDR
Group-IB MDP Report
File info
Filename: d8xwzw-kfumjaytdzd-jr65.eml
File Type: RFC 822 mail, ASCII text
File Size: 23.2 KB
Env info
win7/x86 en
Hashes
SHA1: 5ee61cbd562273fafc0d7b8eede70cc894c30031
SHA256: f4bc898bbe0ffbb20b7186cce3d32d838cab99652e3cf4072a24c4bbafe98d91
MD5: ed7b1aeebb386a6c9627d5615c931b98
Signatures
Execution
T1059 network_wscript_downloader: Wscript.exe initiated network communication
T1204.002 mimics_extension: Attempts to mimic the file extension
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1036 mimics_extension: Attempts to mimic the file extension
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Credential Access
T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
Discovery
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Command and Control
T1071 network_wscript_downloader: Wscript.exe initiated network communication
T1071.001 network_http: Performs HTTP requests
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other
code_share_services: Connects to text storage services (potentially for malicious payload delivery)
no_graphical_activity: No graphic activity
create_rpc_bindings: Creates RPC connection
message_box: Displays a message
error_drawtext: An error occured while executing the file
get_policy_info: Retrieves information about a Policy object
checktokenmembership: Checks user token with CheckTokenMembership call
suricata_alert: Malicious traffic detected
Managed XDR