Resubmissions
11/04/2025, 08:56
250411-kv4dzavnt6 811/04/2025, 08:52
250411-ks623st1bv 311/04/2025, 08:49
250411-kqzvzsvmy6 8Analysis
-
max time kernel
119s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
Fancom BV Quotation Request - RFQ#040925AL.msg
Resource
win10v2004-20250314-en
4 signatures
150 seconds
General
-
Target
Fancom BV Quotation Request - RFQ#040925AL.msg
-
Size
164KB
-
MD5
ed0adbce8cda89e8cead045640a3c348
-
SHA1
2c469543f37918d3c9484594fa3f42b1dd14fe15
-
SHA256
6e726499719a288935470dcc08a8e5d93a04a9e32b3a36b316dc8c4f3601f768
-
SHA512
cc859f42de939d1a1c531f816a7b676554ff011b167405732798af6890bf2d43d55e28fcc132a873f2df40f8062b7e2a9d040d4c4f627478b934d9741c4a48b0
-
SSDEEP
3072:fFZB9PfQCTCC/4Qiqk6ggFZ4+U6g2FZ4nw71:fFtdT4QiqDggZ4cgCZ4
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5820 OpenWith.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe 5820 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Fancom BV Quotation Request - RFQ#040925AL.msg"1⤵
- Modifies registry class
PID:3904
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5820
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2664