Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-es -
resource tags
arch:x64arch:x86image:win7-20240215-eslocale:es-esos:windows7-x64systemwindows -
submitted
22-05-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
EXTERNAL SPAM RES COTAÇÃO TBX.msg
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
EXTERNAL SPAM RES COTAÇÃO TBX.msg
Resource
win10v2004-20240508-es
Behavioral task
behavioral3
Sample
PEDIDO_VENDA_1890.pdf
Resource
win7-20240215-es
Behavioral task
behavioral4
Sample
PEDIDO_VENDA_1890.pdf
Resource
win10v2004-20240508-es
Behavioral task
behavioral5
Sample
image001.png
Resource
win7-20240215-es
Behavioral task
behavioral6
Sample
image001.png
Resource
win10v2004-20240508-es
Behavioral task
behavioral7
Sample
image002.png
Resource
win7-20231129-es
Behavioral task
behavioral8
Sample
image002.png
Resource
win10v2004-20240426-es
General
-
Target
image001.png
-
Size
180KB
-
MD5
ae67786e392f71c0850d0ac222e73090
-
SHA1
72f963ad13e9fb4dd090d78e12529b79433c39e8
-
SHA256
4b4bc6883f36fa1abf8f48c4e170b27840065c40db0eaa104570af0bc4929aa0
-
SHA512
83e63ae972392abf31d422abf95922bc7434e544385bea4464367a086b6e22eee024cd5da4eedac2bc1a554cd7acb98b92755161989cf449ceedec85f0535a85
-
SSDEEP
3072:O5B2oJFhQ/Y8V28icRBgsZFZAwjsNYxR+tJ3/ObfbRbqNk/sJJ8AJSJ:eJFhR228icZbvIyn+tVmboNZRJSJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 2240 rundll32.exe