Overview
overview
6Static
static
1Fwd- [Nexd...53.eml
windows7-x64
6Fwd- [Nexd...53.eml
windows10-2004-x64
3attachment-3.eml
windows7-x64
6attachment-3.eml
windows10-2004-x64
3email-html-1.txt
windows7-x64
1email-html-1.txt
windows10-2004-x64
1email-html-2.html
windows7-x64
1email-html-2.html
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2023, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
Fwd- [Nexdigm] Payment - Invoice #IM33-1753-S3-1 Pay Remittance for 2023-02-01, 04-53.eml
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Fwd- [Nexdigm] Payment - Invoice #IM33-1753-S3-1 Pay Remittance for 2023-02-01, 04-53.eml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
attachment-3.eml
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
attachment-3.eml
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
email-html-1.txt
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
email-html-1.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
email-html-2.html
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
email-html-2.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
email-plain-1.txt
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
email-plain-1.txt
Resource
win10v2004-20220812-en
General
-
Target
Fwd- [Nexdigm] Payment - Invoice #IM33-1753-S3-1 Pay Remittance for 2023-02-01, 04-53.eml
-
Size
506KB
-
MD5
79d1f34e89466ea020de7701038b1235
-
SHA1
37442643cb290c354fda0c7abb4edbbeb68ea844
-
SHA256
38848e4c271c75bcdea254774e94a5e0806104235fe85920c4b160c510780ce6
-
SHA512
8de63fc5b68163159638add687698b239054477e4bf39d94566f26edcaf5bef21415c6b52a15ed75a6b7c183530df0b6a94840617d00f4eba3ea85e6adb7be7c
-
SSDEEP
6144:kyFP2/eReiIvwyJQusiqJ2OJVEy6fMRiVHXKvk2yKoS3CmlPT5j2Td7a45:+e1IvW2JMGXQIKosCqATx5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Fwd- [Nexdigm] Payment - Invoice #IM33-1753-S3-1 Pay Remittance for 2023-02-01, 04-53.eml:OECustomProperty cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4308 OpenWith.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 1296 WORDPAD.EXE 1296 WORDPAD.EXE 1296 WORDPAD.EXE 1296 WORDPAD.EXE 1296 WORDPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1296 4308 OpenWith.exe 92 PID 4308 wrote to memory of 1296 4308 OpenWith.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Fwd- [Nexdigm] Payment - Invoice #IM33-1753-S3-1 Pay Remittance for 2023-02-01, 04-53.eml"1⤵
- Modifies registry class
- NTFS ADS
PID:4260
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE"C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\Fwd- [Nexdigm] Payment - Invoice #IM33-1753-S3-1 Pay Remittance for 2023-02-01, 04-53.eml"2⤵
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Fwd- [Nexdigm] Payment - Invoice #IM33-1753-S3-1 Pay Remittance for 2023-02-01, 04-53.eml
Filesize506KB
MD579d1f34e89466ea020de7701038b1235
SHA137442643cb290c354fda0c7abb4edbbeb68ea844
SHA25638848e4c271c75bcdea254774e94a5e0806104235fe85920c4b160c510780ce6
SHA5128de63fc5b68163159638add687698b239054477e4bf39d94566f26edcaf5bef21415c6b52a15ed75a6b7c183530df0b6a94840617d00f4eba3ea85e6adb7be7c