Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
email-html-1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
email-html-1.html
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
open.gif
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
open.gif
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
quarantine-notification-email-protection-logo.png
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
quarantine-notification-email-protection-logo.png
Resource
win10v2004-20240221-en
General
-
Target
quarantine-notification-email-protection-logo.png
-
Size
5KB
-
MD5
41c956a66f5a549da0babb243a6a3b5b
-
SHA1
ccb0b53971683d0be57634bc39cac32d51e59ee0
-
SHA256
6aebcba38143ecdf51bb1c4c9f93b36766ef661635b662ec8ac829bdc37b8e6b
-
SHA512
1ab41c0a08c81f7677a1abb0f2e0ae7ed0a2436dba00b5fb30f5c4f1cc8e869208ca569763f13fc31ad70d4e62edb95cb8c5517417bd77a810b026784315ea1d
-
SSDEEP
96:pr7/ASjzM6usMxXbZYrlZllwh1kCVa/0tco3smULFj9D+UzAe:J7/AWLusMxrCrlrlTCy0b3snp9D+Uf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 rundll32.exe
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\quarantine-notification-email-protection-logo.png1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2192