Resubmissions
20-09-2022 17:37
220920-v7amjaeah4 320-09-2022 17:14
220920-vsbahseaf6 620-09-2022 17:10
220920-vp4gwseaf3 3Analysis
-
max time kernel
91s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2022 17:10
Behavioral task
behavioral1
Sample
816235675.eml
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
THYNK T&C.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
email-html-1.txt
Resource
win10v2004-20220901-en
General
-
Target
816235675.eml
-
Size
103KB
-
MD5
f875ff5d623eb928c7680d031b5ae365
-
SHA1
819076b0d9bb6ab7e58d38e4aa7484ba64fa6b2a
-
SHA256
38e0b42686db8e75786c211072f1d3c0cbc92b54076f08fe2af7317b1cfc420f
-
SHA512
d6423635971f4ce3fec141f1b4ee1d849446ebd5a4aafe691f594ded7d454ea4ed5be367a9997469a17e49b9fb23a3024a392b00875fb51717e484c1a37755ec
-
SSDEEP
1536:oC7CCLm0OsTEf4P+yMCQo2MeFTwyf1E2hbdAQE4Bmch7fLLkKdqXFsc4Ek4bIszl:tXOKHQo2x6IE2hbdARTcZPq1l4EjEQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\816235675.eml:OECustomProperty cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 5080 OpenWith.exe