Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
4-NOTIFICACION DEMANDA LABORAL -4.msg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4-NOTIFICACION DEMANDA LABORAL -4.msg
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
5- DEMANDA LABORAL JUZGADO 02 LABORAL DEL CIRCUITO-3.svg
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
5- DEMANDA LABORAL JUZGADO 02 LABORAL DEL CIRCUITO-3.svg
Resource
win10v2004-20240802-en
General
-
Target
4-NOTIFICACION DEMANDA LABORAL -4.msg
-
Size
450KB
-
MD5
87e289195af7d0b2588a8b72a034a0ec
-
SHA1
c7f5a6660664b834bfcc5d3017387b66fea04539
-
SHA256
78c8866893236cd959f3a92f0395e74156102a7d1241d86ab32f272cfa29ab29
-
SHA512
d546726076dc1fb04ca191315dc5a794915963324243368024a191a3b8c6542ff0a1dcbb246504068c28da90287e7f6b030f4ebbb018b733831b180a02c9a486
-
SSDEEP
6144:u4G4j56Lf0LsuC4fBpCoK21dE+XlpJGwSsKld:t6LcLLCJ21GApJGwvk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\4-NOTIFICACION DEMANDA LABORAL -4.msg"1⤵
- Modifies registry class
PID:4396
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2204