General
-
Target
DOC21AZ068G2022.exe
-
Size
258KB
-
Sample
221026-dvanbsefck
-
MD5
868608b7e90e467edba786effe32dfea
-
SHA1
6de62b0cd19ddaad25b80ced29d35d80410d1ca4
-
SHA256
5644b2a6b24189d3ffd6e90413150e01dc160e33a062e158f0ef50e0bd02e310
-
SHA512
c5e76faaafb27d519933f50c3d3961943c29fe3c7e59b125a5fd08eec7f6acdcfbc4071661dae1d2b63216b9a417f2fdc9c674ac03a20ba05a17a1b4e5f34100
-
SSDEEP
6144:mbE/HUbk4BzCq3T0yLj6tV/SnSUp36J6fPy0nqFm:mb/xPz/nN188lnqc
Static task
static1
Behavioral task
behavioral1
Sample
DOC21AZ068G2022.exe
Resource
win7-20220812-en
Malware Config
Extracted
formbook
axe3
nV63ydJMXMf7memspIpnnVLl3Q==
uJ50rs5Y/80AqT79guHh
FcsTFQ1xekTgcal8G0P2ZTQ=
uLWWVJP++ID3dkoB8g==
YyoybGF5Fsa/UH8=
Tk4htwkBBfM5ZA==
QgJ8vN9f+uCdsD79guHh
wmjC9UuSBGyTrY5PAX9t1A==
Sw7JEwOKl576ndxw/A==
BOqs09Ikjej1BN98ZYtVfSi5xQ==
YA5cbH3/4wVAYg==
fRWIvatAXM3+t0X9guHh
FAbZXq/jFuaEq2YCwQh3b2oE
STL+RDTA652/tD/9guHh
zgLNcuX32aFB
WmgwW1UCJ/9Nc0ofkIhVyQ==
jiWgy9ckGh8G+3Q7Rl//NW9ZU7TU
JCoawiBkwAkeJOehkNXRCYnj3A==
WQDFZvang91P
zGrJ4CA2pAhR
QPRTjvEmeNHJHLw4
hEsOq/9JLoNbN7xMFR/pVZbo3A==
v8ye4m6wAfCjtD/9guHh
BBLwmMMaoKz+DbU6
sjgLlNkZ9mir2p0w
RA94vAgqczVm8w+fAX9t1A==
Jc7S9gc/CMtY
d3Q3djg/CMtY
VhqBnq4x3sYMs0L9guHh
n/v36+MW2b27KCv99g==
Vi71NEakLqvP3MqenbNiUC4Ag77W
q2PO39wujdOnAuxj/A==
ZR3lmukghPyiLio14Qr3UzQ=
Zl6HrWMq4wVAYg==
cSLhluP/Ofkn0vf86RH8
9eSoKHzSznZ2E2I=
VS76OTqEeTTUTf3yG0P2ZTQ=
SvRzutQ0LP2xOD65OIlNvcGjf7wR95Ls
k35uD09p0eN9KnU=
lFirx9M0pQpUg0jpvjMpH5S0UrTP
ajKdwrz9WE/8A1dLTCw=
CaL/NoESHca/R3Y0GCQ=
Sghzwgx+c9nHatnaLXxVyQ==
UwF0yGa7uiI=
fjKKobYsUVNpBGc=
OScsLPAH3p9A
kVEWzgFRqnZTJ5QB4w==
wpZxCWOk7NaBlkkWI2dWfSi5xQ==
ijqu3+QWAg603ptOFAq1qfMEc1sXIr/5
zZ4ewkBx7qdG
qI9yt8kQwDhe/2/igMWe3CgL
ANUmYpsVtpbSTJViQ3TjXDY=
nzb3pvZA80MQWk3SbYjyUi8=
HAbPWI0YyvXqYJgf4EEpi3xdT6B13J7x
olY01h1WKvkhBy/y7Q==
dGJK/EiDz5UuvM1W9Q==
em4mQ1fciHK2cC3u/EdFfSi5xQ==
pxC52NcfWmjL+qUw
j3o1VEaAW6jAS1tkRjs=
UAK5/hRmtnmXLXQbf+3sTCs=
v2yzvsMvthMyTA7Gq50ZfSi5xQ==
ehryofUgZVKUMZtJ2vCggmkD
B7kHDAhZxHzJHLw4
nYxx+02TYE35jH5JXYU0fLuPYDw=
succes-digitalmlm.com
Targets
-
-
Target
DOC21AZ068G2022.exe
-
Size
258KB
-
MD5
868608b7e90e467edba786effe32dfea
-
SHA1
6de62b0cd19ddaad25b80ced29d35d80410d1ca4
-
SHA256
5644b2a6b24189d3ffd6e90413150e01dc160e33a062e158f0ef50e0bd02e310
-
SHA512
c5e76faaafb27d519933f50c3d3961943c29fe3c7e59b125a5fd08eec7f6acdcfbc4071661dae1d2b63216b9a417f2fdc9c674ac03a20ba05a17a1b4e5f34100
-
SSDEEP
6144:mbE/HUbk4BzCq3T0yLj6tV/SnSUp36J6fPy0nqFm:mb/xPz/nN188lnqc
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-