Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
Фишинг.7z
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Фишинг.7z
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
счет для получения платежа.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
счет для получения платежа.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
счет для получения платежа.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
счет для получения платежа.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
счет для получения платежа.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
счет для получения платежа.exe
Resource
win10v2004-20240426-en
General
-
Target
Фишинг.7z
-
Size
1.2MB
-
MD5
e89282e50114f22c3a9a3de526099b4e
-
SHA1
cabdf997a61ae4bda523bdea6f950731f9d427c9
-
SHA256
d8cfa5a0ddbf5483a170f0a66b6579ddb1cac3e50cb784ea2db0a2d91717abc8
-
SHA512
d5ed27873ed7404b3aed501918e384d5ee728b94238fc7f8029f8cb079195c03d1109c91aa433a9ea09fc36fa39f3af7899a45e2f8cc475c2e80ea604268561a
-
SSDEEP
24576:pt7nnaWxsKo8OgkD8NzHE8lSXFUBkwbP73rwzYQujRCQc3pGP4jhcZxhIf6tIODy:TaWKHEkgzHE8wXE3P73XfjRgGP4FctIr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3852 OpenWith.exe