Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
Europcar Invoice 100343602011 .eml
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Europcar Invoice 100343602011 .eml
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
attachment-2
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
attachment-2
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20231023-en
General
-
Target
Europcar Invoice 100343602011 .eml
-
Size
29KB
-
MD5
aac7afc124af2c6ff78ebcb86ba9b79a
-
SHA1
42bccfc828f01abc73d95c3dbe9758cd4f42edfe
-
SHA256
dc14a54fd196c68736fba013dc4e2161a745832127dae6fa62e2d7984aba4fdb
-
SHA512
e9172754bb86e5a56feaca6afb3ee4927fe022c168e42e6812d26634da6d8783a0cfdd32ab66590f2a74a09c5646c910093383f5e29e746e79f6d475cddd5541
-
SSDEEP
384:zGXOB+KVcGL5TsWfbBhzCHFhEIXaW28YG97wHqcMc80C0UGdI08Xd5r9:zWOUKaG9sWDBhz3IK18YQkHHddIhd5r9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Europcar Invoice 100343602011 .eml:OECustomProperty cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4444 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3800 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4444 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Europcar Invoice 100343602011 .eml"1⤵
- Modifies registry class
- NTFS ADS
PID:1860
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4444
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3800