Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
cabecera-email.png
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cabecera-email.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
pie-email.png
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
pie-email.png
Resource
win10v2004-20231215-en
General
-
Target
cabecera-email.png
-
Size
6KB
-
MD5
625795abda7926b31d5d52659d7ddcc9
-
SHA1
6e2958a85ee407ecb97adf4a30d36ed249ed0824
-
SHA256
d1366cb56ffbdbd7f665bb848780e8066c94c62492208f42388c65b85ff2fd6e
-
SHA512
853cec8078391a626aa930fbfda36b415f5fc99582a770d92d8f5a751216dbb60e01486a63f5ec8c60c56620c822a6d82e9d594f58c14416549ac8bd0fd075cb
-
SSDEEP
192:Bv+P0AAnnXYxjQnfKMULxYbcrZni94ol+jZp:BWTAnoLMuxYT9Vw/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 rundll32.exe