General
-
Target
Purchase order.vbe
-
Size
13KB
-
Sample
230328-wcb3jscc89
-
MD5
496ff1fed502e29c071482cb102610c9
-
SHA1
6f5687c69e8ca873e26f1ee6b10d0ac8d1bbbb90
-
SHA256
19414e87fa7d0c6264b94810039b0465efd408d65efa70f62e9a8ec5ea8f222e
-
SHA512
829dfd71bd579be926e6cde629916868f63d18a2a9238c5362b0785b28fa21c31551fd3b78561d8fec2409d2acf2a96cb2beb242ad877f060311388d585cf2bb
-
SSDEEP
192:o9Al45haj3WuQYv5IdbcBoqEmeZx1zxqNklStddP93YBn/w7c0O23N/rgjKmrF:o9Z7Mvyl+NqZYNdtp30I/xmZ
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.vbe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase order.vbe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Purchase order.vbe
-
Size
13KB
-
MD5
496ff1fed502e29c071482cb102610c9
-
SHA1
6f5687c69e8ca873e26f1ee6b10d0ac8d1bbbb90
-
SHA256
19414e87fa7d0c6264b94810039b0465efd408d65efa70f62e9a8ec5ea8f222e
-
SHA512
829dfd71bd579be926e6cde629916868f63d18a2a9238c5362b0785b28fa21c31551fd3b78561d8fec2409d2acf2a96cb2beb242ad877f060311388d585cf2bb
-
SSDEEP
192:o9Al45haj3WuQYv5IdbcBoqEmeZx1zxqNklStddP93YBn/w7c0O23N/rgjKmrF:o9Z7Mvyl+NqZYNdtp30I/xmZ
Score10/10-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-