Resubmissions

20-09-2022 17:37

220920-v7amjaeah4 3

20-09-2022 17:14

220920-vsbahseaf6 6

20-09-2022 17:10

220920-vp4gwseaf3 3

Analysis

  • max time kernel
    91s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2022 17:10

General

  • Target

    816235675.eml

  • Size

    103KB

  • MD5

    f875ff5d623eb928c7680d031b5ae365

  • SHA1

    819076b0d9bb6ab7e58d38e4aa7484ba64fa6b2a

  • SHA256

    38e0b42686db8e75786c211072f1d3c0cbc92b54076f08fe2af7317b1cfc420f

  • SHA512

    d6423635971f4ce3fec141f1b4ee1d849446ebd5a4aafe691f594ded7d454ea4ed5be367a9997469a17e49b9fb23a3024a392b00875fb51717e484c1a37755ec

  • SSDEEP

    1536:oC7CCLm0OsTEf4P+yMCQo2MeFTwyf1E2hbdAQE4Bmch7fLLkKdqXFsc4Ek4bIszl:tXOKHQo2x6IE2hbdARTcZPq1l4EjEQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\816235675.eml
    1⤵
    • Modifies registry class
    • NTFS ADS
    PID:4084
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads