Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
Samsung_Job_Application_Document.pdf.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Samsung_Job_Application_Document.pdf.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Samsungwork.bin
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Samsungwork.bin
Resource
win10v2004-20241007-en
General
-
Target
Samsungwork.bin
-
Size
22KB
-
MD5
af7eb8652daecaa96592c6de8992c154
-
SHA1
a599e26cce6a65f06d6bb44a0d40c34c540e64fd
-
SHA256
a116b3ab66c8df39a7ed1562bc4c8c479bdbfd2baeb5529eace426be69e4cdb5
-
SHA512
d8169b471eec243610febf5255f84b5f3bd4c0078325852ea939d661c6caa6db9713a50a5ef0e30c9de1ae4ca2b8c3911a98ccd57b70ec8e7c103cc0a5aa8cac
-
SSDEEP
96:oZS0VWxJyk2q1m5Za4v7FXHF/zPnHQpf4uMXNQ6YXx51FNIRD4G8ZYlIhOsKRDRI:oYMMI5ZTFLPHQiuMyzx5QvsKRDRyX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3364 OpenWith.exe