Resubmissions

14/03/2023, 18:31

230314-w51avaba51 5

14/03/2023, 13:54

230314-q7yl5sff44 5

14/03/2023, 13:35

230314-qv24ssfe67 5

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2023, 13:35

General

  • Target

    Payment Advice Notification #19461.eml

  • Size

    30KB

  • MD5

    46ac4958d1c9af9317626faacff8911b

  • SHA1

    3986605c7859817f2b7c50338bb4052fceb68e0a

  • SHA256

    82795c86557f1d5d7080e063c9af6f7470cb67150081528983f70cbaf4e7be61

  • SHA512

    bdef9a164159f3de058016a170b7f8aba6bc8fefa5933cac7b72f939d64607ebf9d42dca00aaeaf5d4cb496416f08cb62b0221b2fb9d30452e46856eb2231247

  • SSDEEP

    768:NtiyiepN21EOoIEtZtWpIkwCmNWaOd0JLnZD:CXoIEtKjwg27ZD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Payment Advice Notification #19461.eml"
    1⤵
    • Modifies registry class
    • NTFS ADS
    PID:224
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1692

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads