General
-
Target
Invoice.iso
-
Size
664KB
-
Sample
221206-qte8mscc24
-
MD5
1f7a968568d5884b0e5d910388b722a5
-
SHA1
92b8e8a9f7a9ecd3a10b9bee9d52e2625cb34dd5
-
SHA256
ef2d1b7a4aacfea1fb48cb9ef4af9e264146b073a39669b3e1ff350885353f62
-
SHA512
8e70d802c14f55c353a7381e3589ff8e991f29c567b7219fee3826647cf7797166ebda36322040f975cce8662a3646a44d2b4acf86bb4d5dc1aca3cca0c5ddca
-
SSDEEP
12288:xOVGmi1JQ52I8sDQJRZ+z+8xmduDYHkUVszxOAzZ21vMiNSp:xcJAJtESRY+8xiHxefoNS
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20220812-en
Malware Config
Extracted
formbook
scse
SKpYFyVNT2zunKf0uuM=
FlEHUseI7I5XbrO8fR/XBcS9ZA==
FPuxoUOxkLiATugw
VKdxsDSk0jdT5Kw=
FpqHf9iI/1tl97E=
YGI6sIl3UIxfZvlD+JiUuuLR
oBAEO0suBEAD5aK00A==
RKJqTzg4gQ/Q6DYSuTjDGkwuyl0ik5Kb8w==
VFg9s3W0/Ype8A3cZb+D7g==
hwD+VNd6014nrsaTWm4FBcS9ZA==
zkAdUq1soKYUfZaTqLmL
XVQ9WbRivUIQ477a/hKv+g==
QireF2geizAwmp674AGc5g==
PSTUQxs6j8OATugw
LHJhyy2VbX8NEqf0uuM=
MiY1vg6T3HqATugw
wqkUjaVXnGgBqA==
jUr/eUtSIT01Wegt
PjQidcqKzAbSZICUZb+D7g==
OkAmcv12sUEAIHwFHakzdIo2FPHw
zyDLsw+3I3H6gnaGZb+D7g==
ll0HRs5IJGxCZMJPahHgOt2RqjU=
YqaIEokHuw6V
jGJG11YCObJ+IQIXCW8KU+ZcbA==
jv4ITr8zITdT5Kw=
nXYro3yHe5YV5aK00A==
rJt1IPkxeQDUayhVCJyUuuLR
oFwz1DUU/RdD5aK00A==
FHlVTKEVIRFE5aK00A==
8GhjL2lJOWD+5aK00A==
k3BLouunGsagwhAi6oeUuuLR
p45GiQN5bZMjR9karDwDa442FPHw
Zdd7rVCKu/b3TIVU6t/lP92RqjU=
wyjxGjYHuw6V
nW5RrwV6yTdT5Kw=
itzGDGclWW4SqnLBSWH5Pt2RqjU=
8zwgceJYRWn+DKf0uuM=
EmojFmj027tsHrs=
ExQEPY5UyyS00HPvNNCH8w==
laiGCZRTkbg/XAl/Zb+D7g==
wYQysWBl+DdT5Kw=
MWo3rYV3XoAJ5aK00A==
hnht0SrcDR+XpjV6H6WUuuLR
rxqw6S7qG8A=
aEcfph/RAUAcfZYnXOw=
EXdVkuuzJ8eEjkTROs2D
MDYsc8l6w0wM7ZOiyQ==
Rw3XPwT+8UID5aK00A==
zDPp+Pskft/5iqS+0Q==
Z8h8hYCm/ULHXQ+YY2kJBcS9ZA==
vTDkm31vabx5EfoFMjLsVpBlz+fQfg==
+EcrRpZyp7tFba65dhvXBcS9ZA==
rHVJpwl6dLSATugw
gUoTghFSoTMpiXyQe9N3uOjQ
47Zwn/CkFQCty07ROs2D
NYkP+jcHuw6V
nfvdFnkHuw6V
L4piRRhAmfwGKITjemhRkmQ=
s6Jdx36Q+t5U7LE=
58iYH6dVmzYCnHZ/Zb+D7g==
IQ/WHZJWuVUD5aK00A==
Cf6t72PUxhnicjvBiFxqP0o2FPHw
DQr7l4R4rlEJ5aK00A==
62gezKeQv8mIIBbcZb+D7g==
kmuregister.com
Targets
-
-
Target
Invoice.exe
-
Size
602KB
-
MD5
75bab4e3e275410ee46f56c96d2ca719
-
SHA1
ff9f741609c0009d066c33d8fd8d668c66f6c829
-
SHA256
1cb82faf9f59ad0c5a831297d038b885c4bf15c933a9730abbcbfab86e6eb1cc
-
SHA512
deb1b0dce46a9bd2b2ee90f61fbe9f41db562b35782c1b83c6ac41ff0c384ea27b828e5ef03e644b9fbd40a1dd0e24a1fa57c4eb625a24752c18b9ac2563ce57
-
SSDEEP
12288:gOVGmi1JQ52I8sDQJRZ+z+8xmduDYHkUVszxOAzZ21vMiNSpS:gcJAJtESRY+8xiHxefoNSo
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-