General
-
Target
INQUIRY-2706220542.js
-
Size
13KB
-
Sample
220627-j4zxgabfh5
-
MD5
3b479e7f75a474410a30a826ca366c63
-
SHA1
445f19fc72214544d3f2ab330fa5ee226dcfea66
-
SHA256
1aed1d8d3570a4e102cb83cf8788793db44ddf1d8d8075459c758a380d035a25
-
SHA512
d8332c16da5031f91e9d12f407f21fd53b4e6bedc2f9e93923236621811cbd2216632a66e6e32dadd18e14bddc69cb01cd254e4b9042ee87778d71f0ec0b6705
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY-2706220542.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
INQUIRY-2706220542.js
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
INQUIRY-2706220542.js
-
Size
13KB
-
MD5
3b479e7f75a474410a30a826ca366c63
-
SHA1
445f19fc72214544d3f2ab330fa5ee226dcfea66
-
SHA256
1aed1d8d3570a4e102cb83cf8788793db44ddf1d8d8075459c758a380d035a25
-
SHA512
d8332c16da5031f91e9d12f407f21fd53b4e6bedc2f9e93923236621811cbd2216632a66e6e32dadd18e14bddc69cb01cd254e4b9042ee87778d71f0ec0b6705
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-