Analysis

  • max time kernel
    143s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2022 18:40

General

  • Target

    1.eml

  • Size

    12KB

  • MD5

    729bdebd96d2b6915eb8a5dc0d8e0504

  • SHA1

    3d02af96da5e2e7d7a1f5d086b2085f0e9363a2d

  • SHA256

    6f6422ab048a17d5d65c369a72b5de0838c5f8eec9564aff68ae1963ac219b50

  • SHA512

    eda319162b12d3fd7ad058b763299d3e201ddf31a0b613da56116e412061db0b792bf7041c70443373c234e4ed02c50b3ca0ec330d71a5f6c7035272275212b7

  • SSDEEP

    384:3prgcEikNTK7aH6OUdp3WwXJXALleUD1ctr:UiaxH6OUddWISeUCl

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\1.eml
    1⤵
    • Modifies registry class
    • NTFS ADS
    PID:1936
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1.eml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    81c96dfdc78955baf5c089e53bc0c46a

    SHA1

    f648c51cd0d2d784d0e8d73c30d6474487162127

    SHA256

    397b12f65672c174b45d98e34e35a655b2ad506e7e180c7714abfac8acb30549

    SHA512

    1991d628ef5e1a0a457cea5ef46a29043ed08ae60727d340fe1a6a759bd09693a3b48b78c9c396afd336b2f7b115ee93c5f0dd1dfabcadb111d2928781e6c51d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    5cd09087a164c72a51c8f77c98536280

    SHA1

    02b68867207fbddc036b45df0bb2542b7267ca0a

    SHA256

    dd308caa2e64fd4996755ff2cafe0861a2ae566d4af24da8cc46c4a6b70b3698

    SHA512

    f3fc27222e1483874ff175c9f72d27eceb71ce558e9f9077dedfd61929fe51b7e104dc7997c4c913dff185b22b82b5d634930c0d7df5f76f6778a5a46c5d4a3f

  • C:\Users\Admin\AppData\Local\Temp\1.eml

    Filesize

    12KB

    MD5

    729bdebd96d2b6915eb8a5dc0d8e0504

    SHA1

    3d02af96da5e2e7d7a1f5d086b2085f0e9363a2d

    SHA256

    6f6422ab048a17d5d65c369a72b5de0838c5f8eec9564aff68ae1963ac219b50

    SHA512

    eda319162b12d3fd7ad058b763299d3e201ddf31a0b613da56116e412061db0b792bf7041c70443373c234e4ed02c50b3ca0ec330d71a5f6c7035272275212b7