General
-
Target
Documents invoice.msi
-
Size
4.2MB
-
Sample
230131-yjg89aaa52
-
MD5
97114551042ab1550cca8a85ca405da1
-
SHA1
6266c37fb9945e3adf4aa09c16526537c5197ba3
-
SHA256
ca6e3ff4fd833ea30e613c4f9e228a04780542575a4f915256fa81349730abfa
-
SHA512
e2588055ea1170320d342f1f13f03155ad58aec7828a6e44589ba08d6e1975b21e23a0ccb0ed18051c3e393e14d34dbc1f5a2a5556eb095155d3914653021df4
-
SSDEEP
98304:pPKnw39kiUnMUYeg8F1HWMUKFln1vEsZSKRkGDs19sirjNGj/:swNJUnMUYetUKFZROBGu5f0j
Static task
static1
Behavioral task
behavioral1
Sample
Documents invoice.msi
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Documents invoice.msi
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
Documents invoice.msi
-
Size
4.2MB
-
MD5
97114551042ab1550cca8a85ca405da1
-
SHA1
6266c37fb9945e3adf4aa09c16526537c5197ba3
-
SHA256
ca6e3ff4fd833ea30e613c4f9e228a04780542575a4f915256fa81349730abfa
-
SHA512
e2588055ea1170320d342f1f13f03155ad58aec7828a6e44589ba08d6e1975b21e23a0ccb0ed18051c3e393e14d34dbc1f5a2a5556eb095155d3914653021df4
-
SSDEEP
98304:pPKnw39kiUnMUYeg8F1HWMUKFln1vEsZSKRkGDs19sirjNGj/:swNJUnMUYetUKFZROBGu5f0j
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-