Analysis

  • max time kernel
    431s
  • max time network
    1159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 09:59

General

  • Target

    attachment-2.eml

  • Size

    111KB

  • MD5

    cf43717e1bfb213c4147deb2429e83c5

  • SHA1

    5e6d40aa1e1f71e67eac03c365f279db9a8a9c0d

  • SHA256

    d8dc1d6927407ebae9476f4ea3c12e15f15c734d5f067ac67ed80cc0505d5695

  • SHA512

    6c0b4802f94984692bb34b5872b40439f7bdaf8249334f7c6e355506f157768cf626ec3d70fb0f676958cf1c4a73b06dc37a75e50c2d4e38f92be59e05953f76

  • SSDEEP

    1536:gDgSaOkHS5ZRlp7RvoZBu5OQf8S8DkDY1FwLrozjgLumiQCdTLwqFPkv3A1fJ8ab:ZSqy/RlpVv8soQfQsIwLUuucnvm5P1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\attachment-2.eml
    1⤵
    • Modifies registry class
    • NTFS ADS
    PID:2492
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads