Analysis
-
max time kernel
82s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 01:58
Static task
static1
Behavioral task
behavioral1
Sample
SUSPECTED PHISHING (Incident 14341) Response required - Accepted - AU 2020289149 - Your ref ISP1V212.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SUSPECTED PHISHING (Incident 14341) Response required - Accepted - AU 2020289149 - Your ref ISP1V212.7z
Resource
win10v2004-20230221-en
General
-
Target
SUSPECTED PHISHING (Incident 14341) Response required - Accepted - AU 2020289149 - Your ref ISP1V212.7z
-
Size
110KB
-
MD5
5ef8f0bf232bdd11b50f8aaf856ae8cb
-
SHA1
452d714e9e5242377e4ba2c316fe2644cf0c9793
-
SHA256
83d3a65f9f7673226e5df8579cde00f16d7b85a3640d320f57ac1e8b5ed8c35f
-
SHA512
e8f0bd73a89877d1fd7c6ea2531381cd20c35e6409716dd138db0fb27be36b5f9b108588272cddfbfba74e747a4b51570083f7f9a8236feb469d1e0c1f7dd82f
-
SSDEEP
3072:LYyIcJ0VCc84+53Kwysvzv7UWdz3tVFPThTegIAA7:LYkSsjRZiwzDUWt3tfL5c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1156 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SUSPECTED PHISHING (Incident 14341) Response required - Accepted - AU 2020289149 - Your ref ISP1V212.7z"1⤵
- Modifies registry class
PID:4640
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1156