Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-01-2024 17:54

General

  • Target

    [External]hi[1].eml

  • Size

    10KB

  • MD5

    54a5c9517a29dee5b8cd3ea3b8d89403

  • SHA1

    4373a8614f8d8fc2be0e29d75c791836de9d5908

  • SHA256

    94e85ea70fcbf7f441b66e3a2f26f21a7ddd018cd3a0ef8d9e5f6af160ad5420

  • SHA512

    3d7a291a11bba73e4f7f14057841671f6719efccf259f22b70cd48ca3a9296bd50aeaa9c1dfeb4b65c8843d93156c25aa078514dd58312e4f845d861abdc6f84

  • SSDEEP

    192:4KQBSgmVEGFYT5228G1XZp1vnskdNRew/lqBM5JljjaHrR:oBSLEGmTd1XZznsktv/lqC3jK

Score
10/10

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\[External]hi[1].eml
    1⤵
    • Modifies registry class
    PID:308
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\[External]hi[1].eml
      2⤵
        PID:4660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads