Analysis
-
max time kernel
104s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
Urget Contract Action.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Urget Contract Action.eml
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Urgent Contract Action.pdf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
email-html-2.txt
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win10v2004-20250313-en
General
-
Target
Urget Contract Action.eml
-
Size
604KB
-
MD5
048c02e929690bcb0a537d08e71f6b50
-
SHA1
e35f34239708f1d2ac63dc88366dcb3686d0d1eb
-
SHA256
c5fe32e5de97a1c0ff01c7bcbc99d7086a485b6df9ac7cdb37e906f6e1d01da3
-
SHA512
bd942387e85c4981cba4617089728958e7bf163efb73ee5624e3f5e409552426a3ee67d0900bca18dc089552d5c855ca99dbf5115f4293eb5162e346a68fcaa9
-
SSDEEP
12288:G35ETPjPNu1JoTIIu4Q3H3KNgrYq/6lm2pNRs/P7IunP9m4QSmWveSI:PPDkreIItQqev/Qmofs/TdnPvPpeB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Urget Contract Action.eml:OECustomProperty cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 220 OpenWith.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe 220 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Urget Contract Action.eml"1⤵
- Modifies registry class
- NTFS ADS
PID:1456
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:220