Analysis

  • max time kernel
    137s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2023 08:36

General

  • Target

    Order_Information.url

  • Size

    206B

  • MD5

    9c4d758f0492ff9a7e7d4f966471f083

  • SHA1

    e5ed69c26df62d6b6faf76a8b21de3389844046b

  • SHA256

    0b1b8b8533f16fb7724c9f161b08bae2abea361447e0dbe903795a0cd2c6d7b0

  • SHA512

    499f445b4417727949b683e66a54acc78f728141673d9d6854be7046ab4d53d3f77257a4dbab2c8ca2566e72912ca272e88d2db8d59ea57d946663b800b93e7b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Order_Information.url
    1⤵
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:4124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads