Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
02--NOTIFICACION DEMANDA LABORAL ADMINISTRATIVO POR INCUMPLIMIENTO.--.eml
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
02--NOTIFICACION DEMANDA LABORAL ADMINISTRATIVO POR INCUMPLIMIENTO.--.eml
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
email-html-2.txt
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
email-html-2.txt
Resource
win10v2004-20230824-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20230703-en
General
-
Target
02--NOTIFICACION DEMANDA LABORAL ADMINISTRATIVO POR INCUMPLIMIENTO.--.eml
-
Size
17KB
-
MD5
b4007963aa62e59bcaf589618ea57c80
-
SHA1
244344295dd222a7558d0e3843e1d6c6b3578b3b
-
SHA256
ac40757d015370b9d0f73c74e989e2d21af96276607b9af9e70915dcc787818a
-
SHA512
a8323d51b31cc41e8fb0ce783abb0ec9bcaefea41030259f387893c9ab6ec3d04abaf6a5c0a06e5e519b5de8e036294d93c416e099361777b65f07bb0a68f4b6
-
SSDEEP
384:oWkcxEsEbK2+1yajEGC/d0K6X4qRSd+uInLfMELDsRQkUH:jEsEbKgS40vyinDMEflk6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\02--NOTIFICACION DEMANDA LABORAL ADMINISTRATIVO POR INCUMPLIMIENTO.--.eml:OECustomProperty cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5004 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\02--NOTIFICACION DEMANDA LABORAL ADMINISTRATIVO POR INCUMPLIMIENTO.--.eml"1⤵
- Modifies registry class
- NTFS ADS
PID:1480
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5004