General
-
Target
PURCHASE ORDER 29.09.2022.exe
-
Size
777KB
-
Sample
220929-zta4cscab3
-
MD5
c886ccb770ce75fd527764419359a07b
-
SHA1
2c8d8762c84784887793c6685d02b8e18f2bb4f8
-
SHA256
fbc14992308d88c7a33989479793655a4ff4c9caeb3c011f6e95b11c55f675ef
-
SHA512
da6d5adc4b33a3389720c39094cc08b1d44c536a56f6b4610388711923cfdb2bc7fa9c8470d50239cc71d463ec1cd8f3a6a1ce6ac23d2d00c98150559034e022
-
SSDEEP
12288:N2iN8yxhnQvuVOKj7ahCx7dY53i57gHG9281/Q8iDznP:N1iyxhnQvuVOKY47dVsHG928Wn
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER 29.09.2022.exe
Resource
win7-20220812-en
Malware Config
Extracted
formbook
uymo
A4J+j1lFUiMbPgQD0uzpdg==
F3lajp/JwxgpzPZ3bf9zrK0EzWDU/JY=
bOCwjfx/jOF4Las6GFv7+tQ=
9BDZHgUVSa1ypSWjNcPR
S9u+wp+ai+yEW4OWIQ==
wXxiP8BRWDG2JiTw5XA=
VeumNjNg3QeL/qtw
KYxbMI9RU7eqPpEYg1v7+tQ=
zwfU2Vv4NxXzDLy1IWFrDo3iqOoV1KB3
0XQ3wM3oGntH+iTw5XA=
nx7p2XIfYkHv9+Uu+VKx3l41j3mS454=
+BIOmtNni5xbAo5VEZFYQFAw
tkQa0SXOEjV/0yTw5XA=
YOLHv42Us4eMrHCod80dYluXJzNn
HZdsbBNsdAvOq+cr4CaIfg==
YlQ/0dwFQYtd+DXIxzKUlO8kBc9C9A==
mCL+zS69yZ9DyvVMC4399tE/Xk0V1KB3
+tXLkwCl2LyCqaNnalv7+tQ=
yPzM2bjLKPyixsjWSoWe9NI=
KQPQVL5puBHigv/RmyAU0ExD4GDU/JY=
JvKyLYsRMI2eQH4OQrebYQ==
HvrKKC9HQdKSW4OWIQ==
p9Sx6ie6rYwuxDm5sQbZ
UaaHyOMC+VT0Q3/1g82zLvwXcl1+
66h/Ay3OGvu/EiTw5XA=
PXw/UO+Fm7Bx5SWEL6cRC5YvSwRwCsN/
Q0EktsDXF4M+v+O5jgzO
x9Kw+8TDzSQYyA9uGFpUp06Ywg==
ZLBtbv+o8Pfz3kbXRID+Bs2RKmr1Y04b5A==
Osy8wKGdt5mXpm52/Flbp06Ywg==
a/i5N40UXcn0GNTLR1rmrvkALU0=
KR/wD+0NEqt/W4OWIQ==
2IRS4je8+cSuTIMUEFv7+tQ=
G3pJUeaZF+49W4OWIQ==
cx7olwCt/6K97JpoDHow8EvAl+dw
K6Jc4l8WqbXE
mYFozKXUK7zUgdNTV93qhvE4
BW9RWSo1MY8tRjFxN5Htp06Ywg==
hc+pu5Suqw8QnZmuhctYQFAw
sFAJl/t7tBhCaSe5sQbZ
MG1EEShq9h/ae+c=
1ibC9F5Npwk=
68qwb3sWqbXE
/PjVVbxRrjMwW4OWIQ==
Rsy3gq6/sg==
i5tqtbri2SfQBQ1KElv7+tQ=
eKiFlF5eqbaL/qtw
9q6BF270EWZsBy91cLQWC9Y=
ExLkJvn7EKVudy65sQbZ
TgDl2cXOEr2kLiTw5XA=
c93K2KWlHs9W8STw5XA=
BY6GjF6ClSTg7OO5jgzO
TX5lkGNnpv/R9A==
hOKqhe2K0sB4XAgC0uzpdg==
njAAwivU9M1kwnwLfFv7+tQ=
tuCt6svLyxcDrfhHQrebYQ==
YgFhX0yTVL5EuO8=
BE4kVDdOjvOjDi56Klv7+tQ=
Lr6Qa81hdlH6qzm5sQbZ
RJ92hwuPn3oQqi65sQbZ
C1EcGPQnM5EvQzBwKVv7+tQ=
hO7e83wwjpdAyQF46fGqKv0Xcl1+
4cuR28DW6bUyJdWnW+XtlpmciXEj7Q==
skDwJ+vzKjvc/g==
cdrhdl.com
Targets
-
-
Target
PURCHASE ORDER 29.09.2022.exe
-
Size
777KB
-
MD5
c886ccb770ce75fd527764419359a07b
-
SHA1
2c8d8762c84784887793c6685d02b8e18f2bb4f8
-
SHA256
fbc14992308d88c7a33989479793655a4ff4c9caeb3c011f6e95b11c55f675ef
-
SHA512
da6d5adc4b33a3389720c39094cc08b1d44c536a56f6b4610388711923cfdb2bc7fa9c8470d50239cc71d463ec1cd8f3a6a1ce6ac23d2d00c98150559034e022
-
SSDEEP
12288:N2iN8yxhnQvuVOKj7ahCx7dY53i57gHG9281/Q8iDznP:N1iyxhnQvuVOKY47dVsHG928Wn
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-