Analysis

  • max time kernel
    440s
  • max time network
    441s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09-08-2024 20:47

General

  • Target

    Check this out --- I own very sensitive information about your web activities.eml

  • Size

    33KB

  • MD5

    c08d1877979d20c72c322ab0ab12b6f0

  • SHA1

    7368c1eb944d8b61859941c398e0d0f7a0ee06ae

  • SHA256

    9b267c09d9f8c9c52aa6764914d8713c4bc3846a39899c922728d6ac260b6127

  • SHA512

    c2e9137c86f410f45e7baaa956f3641efaf7a518fcf4a97b237d755d4b9df085880ba86bfbbe5eacc5221baffbc57dac3bfd8bd37ebd86cc0a295ece8943390e

  • SSDEEP

    384:bmPQAybd9lzTojOvzPyIReG4MkwKUcgpXdJCPfZ0IdP6F+abVZJCk61mmu6o8eYq:bhDfXztkJ3q3saHUmJeMd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Check this out --- I own very sensitive information about your web activities.eml"
    1⤵
    • Modifies registry class
    • NTFS ADS
    PID:440
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads