Analysis
-
max time kernel
243s -
max time network
241s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
TEST.msg
Resource
win10v2004-20230703-en
4 signatures
300 seconds
General
-
Target
TEST.msg
-
Size
23KB
-
MD5
52d8fa55f2fc79908f1343b06e3003c4
-
SHA1
203fe3716f2db2968172d4e5af11d6fed996d7e7
-
SHA256
6b6d24ee30e23a219003a221ab391a44077cff9c21357ba0cd7cd745de7db0a9
-
SHA512
62acd36dc170b011e785ed512acb0fc6d8e492203e035e4199f3832eb7b208f03b62c0f03600615cd17c4440ac56184f0e4dc1cd7a53df64c5b3021bd54a70e3
-
SSDEEP
384:r4FCdap9Qk03r9DtMkrVUdbiSaPggd/S:r4FCdap9Qk03rvFr3Pgo/S
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3960 OpenWith.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe 3960 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TEST.msg1⤵
- Modifies registry class
PID:2084
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3960