Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
MOVIMIENTO BANCARIO EN LINEA - PAGO REALIZADO.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MOVIMIENTO BANCARIO EN LINEA - PAGO REALIZADO.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
H.png
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
H.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-plain-1.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
General
-
Target
H.png
-
Size
7KB
-
MD5
479fa49d6b40a02b49c93e072be80d04
-
SHA1
c240cf8b0f9a5737bcc97257d0943bf89845ef84
-
SHA256
f35fb0076d9b4d2de9ebbe4ff31be3e85b77421c53ae91732ace50e910bcde8b
-
SHA512
3111b8c76159af6a200f75ec41a6da67d72e33350b94a48fc49662bda399a95e5b8bfd962e3904990e5b5917aa5b3982357ca1a5e253e3afee7ce271b2efdbc7
-
SSDEEP
192:RMWesmQSig2lYJ9gqyzGobdXamupsFCoAUKx:RMWeJQzg2liiGobdqRphn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2432 rundll32.exe 2432 rundll32.exe