Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
25-01-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
[External]hi[1].eml
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
email-html-2.txt
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
email-plain-1.txt
Resource
win10-20231215-en
General
-
Target
[External]hi[1].eml
-
Size
10KB
-
MD5
54a5c9517a29dee5b8cd3ea3b8d89403
-
SHA1
4373a8614f8d8fc2be0e29d75c791836de9d5908
-
SHA256
94e85ea70fcbf7f441b66e3a2f26f21a7ddd018cd3a0ef8d9e5f6af160ad5420
-
SHA512
3d7a291a11bba73e4f7f14057841671f6719efccf259f22b70cd48ca3a9296bd50aeaa9c1dfeb4b65c8843d93156c25aa078514dd58312e4f845d861abdc6f84
-
SSDEEP
192:4KQBSgmVEGFYT5228G1XZp1vnskdNRew/lqBM5JljjaHrR:oBSLEGmTd1XZznsktv/lqC3jK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-655921741-723621465-1580683668-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-655921741-723621465-1580683668-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 3848 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
OpenWith.exepid process 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
OpenWith.exedescription pid process target process PID 3848 wrote to memory of 4660 3848 OpenWith.exe NOTEPAD.EXE PID 3848 wrote to memory of 4660 3848 OpenWith.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\[External]hi[1].eml1⤵
- Modifies registry class
PID:308
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\[External]hi[1].eml2⤵PID:4660