Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 22:16
Static task
static1
Behavioral task
behavioral1
Sample
Orden de compra-password(Y6V1AmQz).zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d12b6e43b876a44527607a4dfdeb5f125020bbb3b674cae1886fea0812d1c5d.eml
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
840a07a2.png
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Nueva Orden de Compra 5424.rar
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
Nueva Orden de Compra 5424.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
email-html-2.html
Resource
win7-20240903-en
General
-
Target
840a07a2.png
-
Size
60KB
-
MD5
840a07a2c80072c43b91040886b301d4
-
SHA1
a222667e355d8a4dfa0c7009f4d33e3016572689
-
SHA256
7568e6027ae2504c1aea3e202c961088df6dc946d42e3cb13f4185395d8e52b9
-
SHA512
ce953616e0369df731957db30d8ff12bbe83a82e5278ac0fa0f64b71adcf7d7ba7aae26f924f3741cd7144e71e7280842b520fdce22cf18413c217b203e305ca
-
SSDEEP
1536:EKO3DALHlgf29YZai9t8JbmlW5wKucQlE/JyZaPAq:FLHlgu9YZL986lW5wKucyEQZZq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1992 rundll32.exe 1992 rundll32.exe