Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
The shipping address on this shipment (Tracking number_ EE 271 664 208 AU) does not match the address on your account.eml
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
The shipping address on this shipment (Tracking number_ EE 271 664 208 AU) does not match the address on your account.eml
Resource
win10v2004-20240611-en
General
-
Target
The shipping address on this shipment (Tracking number_ EE 271 664 208 AU) does not match the address on your account.eml
-
Size
24KB
-
MD5
44f4d1c8e25014990fb975cd14b0040c
-
SHA1
933a999dd8f220d2157a58d7bedc3f80c52714b1
-
SHA256
78c1eabe7a2304026152ba592c7a64afd6c189030f24cbf1bffd75da96a0ced9
-
SHA512
87373b597ca1bfa9927f03a09968cab2eb55feccda6d340f5a2d99c10f7b216af10f3ffce3773ce8b65273d47c6eec23dd7e4a93a3f355f330a24db1375462bd
-
SSDEEP
384:+5I5PSZi94ci0hUyk5JQ6nky1WJ5K35BtoSMRn8:kI5594cIXScl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\The shipping address on this shipment (Tracking number_ EE 271 664 208 AU) does not match the address on your account.eml:OECustomProperty cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1172 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\The shipping address on this shipment (Tracking number_ EE 271 664 208 AU) does not match the address on your account.eml"1⤵
- Modifies registry class
- NTFS ADS
PID:4520
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1172