General
-
Target
Nuevo_orden.xls
-
Size
1.4MB
-
Sample
221208-m19t2scf9z
-
MD5
3ec6082c0c3d4230f50fb5492fca4ce5
-
SHA1
7785a87183386d911ef22ef01f56a124d5bbb4ed
-
SHA256
fdd33a137aa5e4b3a1b1268297372067e246a8c0d9a812fb691a2d685444308d
-
SHA512
09dca1b64c7f43f6855f530462079213ab8ae14f6eb4e70720d236c0ff7407ebd144880ad3f230f6f3c727866377fa75622baf2db476f7270e3ff8110bde516a
-
SSDEEP
24576:nzxXXXXXXXXXXXXUXXXXXXXXXXXXXXXXD+m/Vr5XXXXXXXXXXXXUXXXXXXXrXXXx:I0S/XpWUe
Static task
static1
Behavioral task
behavioral1
Sample
Nuevo_orden.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Nuevo_orden.xls
Resource
win10v2004-20221111-en
Malware Config
Extracted
formbook
ctap
7fuiHU5O7pBugItrXtDlRbQzVNAypQ==
Ioe4Ezkvrkk5SljtGsXC
7SdYmzWqxYzoB10eYg==
87z12VKpqmy0nXHtGsXC
frPRoZR38nhTXl/tGsXC
JybcU3xwAWn21yEPd4XnKA==
B6LTKeV3SeQZAg==
9iFOJSEVtE+I6ea4tn6M72ANGm3K
bROuHdVCVl63QIZuI2etey+ugP0=
25FDh/Be3fhaReK+BwZm9aY+og==
ipYbazKawI7oB10eYg==
Y3ONgI2GHcStmm5WhEZCsE/GlNJovg==
NMjp1U2zzpPoB10eYg==
ZZOygHxoGkBxNTz1RnI=
Hy1dkswBcyQh
94qXZbB1+8ciD4Q=
JUhyQ8Fxl+4gBA==
7wuj4eTJFutgR7+k1R8mIA==
Nj3QJ1RBulY2AMS/1R8mIA==
LjFXk8zI5vgdq8N6ropiNA==
nY89gXJDEfBVKr92
B6LYriOAfArPHHFJ6GL7ft3U
kIk7p27kZ33eB10eYg==
eA93/mraXg+2L+9MtmgTxVFItQ==
hc1xr6OdNMsCXLheEGU=
IA87HCkHromAm7R9SMmazj/qn9behvU=
Mj9foknCAtvQXt9xIk2JQh4=
W3Gh+zkYE/uwRpM=
lZEqcCOT0ZjEwMKpmirjivje
CyNbfy0ZGDBqug/N1R8mIA==
X+4HQAlw2o6vVCLr9MTK
5y5nRkks1fIkCNS+67249aY+og==
ysBJtXMhhFw8
oRVBObsWGKfcB10eYg==
ME2B0Qf9HOfXchPW1R8mIA==
YY2ziIVy94hNYder3LnK
lH2tk42AJ/Vl8Dgj0s4VW6QNGm3K
D7JHhgNmmWtOn++PTX0=
0N2KxcSUx21K0Fwma3XgJZANGm3K
NR0jmgFqj09zeeLaFV3R7UxHtQ==
9hNEpVbKBNbEL3Ba9Qtq9aY+og==
3Q3ECwbkbyxftAnI1R8mIA==
lLPuydDCft4kb1/tGsXC
2WDm19rOej+aLId3M4/uMRDToNbehvU=
na3eP/JYl+4gBA==
NgVn3Zf5DvuwRpM=
8KNWzX3pIP71kYNyL226kxA=
RWCN6JUQTzuuBF8YYw==
dbtazAEhhFw8
TodAs+DIvF8nB10eYg==
1w7DOefwp0VL3LN+
HWgRe80ul+4gBA==
6V90Vb8hol01GPG9wXxNJjD/zyLqzV1e
44Kv2dbKhVtkUNKe/PpHwV5VQOA=
5vwtBv8ETBt01NyhPowI7kUJDlDA
drvozVi17rfkqWvtGsXC
CcdTmqRx/+dKGQ==
0dMEQ3Jsi1Q7B10eYg==
CVIeZrIa8thL3LN+
3Bmb3Y/zF6zeB10eYg==
/wmj22e/8s0zBpV5wqeN0kgzFqHrEnNR
BilUKx8bGvuwRpM=
gq3aAzwoLDeX+PzIkCrjivje
Mt/80j+6RE+s1yEPd4XnKA==
anniistore.com
Extracted
xloader
3.Æ…
ctap
7fuiHU5O7pBugItrXtDlRbQzVNAypQ==
Ioe4Ezkvrkk5SljtGsXC
7SdYmzWqxYzoB10eYg==
87z12VKpqmy0nXHtGsXC
frPRoZR38nhTXl/tGsXC
JybcU3xwAWn21yEPd4XnKA==
B6LTKeV3SeQZAg==
9iFOJSEVtE+I6ea4tn6M72ANGm3K
bROuHdVCVl63QIZuI2etey+ugP0=
25FDh/Be3fhaReK+BwZm9aY+og==
ipYbazKawI7oB10eYg==
Y3ONgI2GHcStmm5WhEZCsE/GlNJovg==
NMjp1U2zzpPoB10eYg==
ZZOygHxoGkBxNTz1RnI=
Hy1dkswBcyQh
94qXZbB1+8ciD4Q=
JUhyQ8Fxl+4gBA==
7wuj4eTJFutgR7+k1R8mIA==
Nj3QJ1RBulY2AMS/1R8mIA==
LjFXk8zI5vgdq8N6ropiNA==
nY89gXJDEfBVKr92
B6LYriOAfArPHHFJ6GL7ft3U
kIk7p27kZ33eB10eYg==
eA93/mraXg+2L+9MtmgTxVFItQ==
hc1xr6OdNMsCXLheEGU=
IA87HCkHromAm7R9SMmazj/qn9behvU=
Mj9foknCAtvQXt9xIk2JQh4=
W3Gh+zkYE/uwRpM=
lZEqcCOT0ZjEwMKpmirjivje
CyNbfy0ZGDBqug/N1R8mIA==
X+4HQAlw2o6vVCLr9MTK
5y5nRkks1fIkCNS+67249aY+og==
ysBJtXMhhFw8
oRVBObsWGKfcB10eYg==
ME2B0Qf9HOfXchPW1R8mIA==
YY2ziIVy94hNYder3LnK
lH2tk42AJ/Vl8Dgj0s4VW6QNGm3K
D7JHhgNmmWtOn++PTX0=
0N2KxcSUx21K0Fwma3XgJZANGm3K
NR0jmgFqj09zeeLaFV3R7UxHtQ==
9hNEpVbKBNbEL3Ba9Qtq9aY+og==
3Q3ECwbkbyxftAnI1R8mIA==
lLPuydDCft4kb1/tGsXC
2WDm19rOej+aLId3M4/uMRDToNbehvU=
na3eP/JYl+4gBA==
NgVn3Zf5DvuwRpM=
8KNWzX3pIP71kYNyL226kxA=
RWCN6JUQTzuuBF8YYw==
dbtazAEhhFw8
TodAs+DIvF8nB10eYg==
1w7DOefwp0VL3LN+
HWgRe80ul+4gBA==
6V90Vb8hol01GPG9wXxNJjD/zyLqzV1e
44Kv2dbKhVtkUNKe/PpHwV5VQOA=
5vwtBv8ETBt01NyhPowI7kUJDlDA
drvozVi17rfkqWvtGsXC
CcdTmqRx/+dKGQ==
0dMEQ3Jsi1Q7B10eYg==
CVIeZrIa8thL3LN+
3Bmb3Y/zF6zeB10eYg==
/wmj22e/8s0zBpV5wqeN0kgzFqHrEnNR
BilUKx8bGvuwRpM=
gq3aAzwoLDeX+PzIkCrjivje
Mt/80j+6RE+s1yEPd4XnKA==
anniistore.com
Targets
-
-
Target
Nuevo_orden.xls
-
Size
1.4MB
-
MD5
3ec6082c0c3d4230f50fb5492fca4ce5
-
SHA1
7785a87183386d911ef22ef01f56a124d5bbb4ed
-
SHA256
fdd33a137aa5e4b3a1b1268297372067e246a8c0d9a812fb691a2d685444308d
-
SHA512
09dca1b64c7f43f6855f530462079213ab8ae14f6eb4e70720d236c0ff7407ebd144880ad3f230f6f3c727866377fa75622baf2db476f7270e3ff8110bde516a
-
SSDEEP
24576:nzxXXXXXXXXXXXXUXXXXXXXXXXXXXXXXD+m/Vr5XXXXXXXXXXXXUXXXXXXXrXXXx:I0S/XpWUe
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-