Analysis

  • max time kernel
    108s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2023 11:50

General

  • Target

    3822C08E1584FCF3725BAD8CECE32F7AB0B2CE4031CE08CB9E4EF5EB3D22A714.msg

  • Size

    161KB

  • MD5

    283f9cdf6c0dcc4f830a88dc1de81763

  • SHA1

    70a42ecb5aa2609f853bd5e7aab55142c9689e36

  • SHA256

    3822c08e1584fcf3725bad8cece32f7ab0b2ce4031ce08cb9e4ef5eb3d22a714

  • SHA512

    b9711df8ebd42d7a78bed8585b001895a3af975d5aeab0978e46215c43f2a3dc04b535e6b9d6988f65d7a8710a1ec816d504fb2b3c464b39a53aa248fcb2c034

  • SSDEEP

    3072:zi56wl/Q7GHzLHB97FKLXUcEMIv3XUq8VE3t4TGmtg65Yryxy:Rq/Q7GHzLh97oLXUN3XUq8VE947tg65

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\3822C08E1584FCF3725BAD8CECE32F7AB0B2CE4031CE08CB9E4EF5EB3D22A714.msg
    1⤵
    • Modifies registry class
    PID:5056
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4052

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads