General
-
Target
_43234355_Contract_of_Sale_pdf.hta
-
Size
840B
-
Sample
230327-xcaedsgg9x
-
MD5
6a8c611062057298887c83ccfe702a15
-
SHA1
8c3023a178c326d9da94273f6dfe62c73ca07f96
-
SHA256
27c34ef5f274515bb252b5e52c009260764918de9b44ef8a1eb549f221f66075
-
SHA512
c562f01f83fbc88f2b4f1177ebcba5ee1a1b752ab7ff94f910d064a4f6d012872496b2082f1bd1d8446b4c5e166bc6e7cdc35c98220742703ee4e30878896133
Static task
static1
Behavioral task
behavioral1
Sample
_43234355_Contract_of_Sale_pdf.hta
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
_43234355_Contract_of_Sale_pdf.hta
Resource
win7-20230220-en
Malware Config
Extracted
https://ggdt.xyz/windows/Windows.txt
https://ggdt.xyz/windows/Windows.txt
Extracted
xworm
property-gourmet.at.ply.gg:51618
Xf5kvWS6zqGxig4q
-
install_file
USB.exe
Targets
-
-
Target
_43234355_Contract_of_Sale_pdf.hta
-
Size
840B
-
MD5
6a8c611062057298887c83ccfe702a15
-
SHA1
8c3023a178c326d9da94273f6dfe62c73ca07f96
-
SHA256
27c34ef5f274515bb252b5e52c009260764918de9b44ef8a1eb549f221f66075
-
SHA512
c562f01f83fbc88f2b4f1177ebcba5ee1a1b752ab7ff94f910d064a4f6d012872496b2082f1bd1d8446b4c5e166bc6e7cdc35c98220742703ee4e30878896133
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-