Analysis
-
max time kernel
134s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-es -
resource tags
arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
22-05-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
EXTERNAL SPAM RES COTAÇÃO TBX.msg
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
EXTERNAL SPAM RES COTAÇÃO TBX.msg
Resource
win10v2004-20240508-es
Behavioral task
behavioral3
Sample
PEDIDO_VENDA_1890.pdf
Resource
win7-20240215-es
Behavioral task
behavioral4
Sample
PEDIDO_VENDA_1890.pdf
Resource
win10v2004-20240508-es
Behavioral task
behavioral5
Sample
image001.png
Resource
win7-20240215-es
Behavioral task
behavioral6
Sample
image001.png
Resource
win10v2004-20240508-es
Behavioral task
behavioral7
Sample
image002.png
Resource
win7-20231129-es
Behavioral task
behavioral8
Sample
image002.png
Resource
win10v2004-20240426-es
General
-
Target
EXTERNAL SPAM RES COTAÇÃO TBX.msg
-
Size
412KB
-
MD5
8d43c6b4d391a491c3e924f7226fc24c
-
SHA1
d492060d01c6bf0dbb67891dbff9423074f356e9
-
SHA256
5d7bfd37a114feaddc99f9ef506a667427eb5f1c73b6055b7446f42fd3acbc36
-
SHA512
cfd46a479268c0be1f809b3e47b43fe51d79e11a8b74ed8cd762c2665016793d7901d37a5ed4b6f47a786d14c0391b4f2408dfd02bea9a8f660068b85f877cef
-
SSDEEP
6144:70wwnOENjPW154fSYQxS3sAb8oV3JFhR228icZbvIyn+tVmboNZRJS:gw0OEtWHYR3sq8oJFhtcBgynCVmUv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4704 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\EXTERNAL SPAM RES COTAÇÃO TBX.msg"1⤵
- Modifies registry class
PID:4948
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4704