Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
Ref_Vendor Disbursement Note- EFT PAYOUT Attn_--Ledcor f5c8530a2888f8ebac18ae3b8392de99.eml
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Ref_Vendor Disbursement Note- EFT PAYOUT Attn_--Ledcor f5c8530a2888f8ebac18ae3b8392de99.eml
Resource
win10v2004-20241007-en
General
-
Target
Ref_Vendor Disbursement Note- EFT PAYOUT Attn_--Ledcor f5c8530a2888f8ebac18ae3b8392de99.eml
-
Size
28KB
-
MD5
ec24a437dca6fc5d10787d828ca30799
-
SHA1
1b07b58e9a3ead4f4ceab02cd64f26ebcd93123d
-
SHA256
2c8903e1beb376356da2b6da330e45c0cfa926162f5c6506deae589ed693cce1
-
SHA512
b1f0702adf8a2aa08169524000e165c3c7a267a54e8ef0ec37a9fa2f0c078fdbbf8cbff1464a1e0b2b0a8f6817d9641fa5ca00adb612e228c350d32bdb244cfa
-
SSDEEP
768:ZgbOntgWr/39cZbLitYB8y3pUOwWG+fC2xkel7inujojEH:ZgbOn732ZbLiI33GIC2xkecujo4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Ref_Vendor Disbursement Note- EFT PAYOUT Attn_--Ledcor f5c8530a2888f8ebac18ae3b8392de99.eml:OECustomProperty cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2424 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Ref_Vendor Disbursement Note- EFT PAYOUT Attn_--Ledcor f5c8530a2888f8ebac18ae3b8392de99.eml"1⤵
- Modifies registry class
- NTFS ADS
PID:940
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2424