General
-
Target
ogpfp.webp
-
Size
2KB
-
Sample
231111-ym1j1acb24
-
MD5
34c23c33643b37d0a38e636dfdaa7998
-
SHA1
3468bd3d1ba7605ab2f92c942a64bcd4b361075f
-
SHA256
525e633900e52ac6f6e58f1e2ddb8585fda73a62babe82d181dc28abceec5aa8
-
SHA512
5339ea5fe97089dcb3577ac632ce14e2cc5f6bbf67bb8ff19e1d5037ae987d1cb11c3d0dc8b7914b012fc418e7f5d16575df7ff312af98c7c0365c8f2d742356
Static task
static1
Behavioral task
behavioral1
Sample
ogpfp.webp
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ogpfp.webp
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
ogpfp.webp
-
Size
2KB
-
MD5
34c23c33643b37d0a38e636dfdaa7998
-
SHA1
3468bd3d1ba7605ab2f92c942a64bcd4b361075f
-
SHA256
525e633900e52ac6f6e58f1e2ddb8585fda73a62babe82d181dc28abceec5aa8
-
SHA512
5339ea5fe97089dcb3577ac632ce14e2cc5f6bbf67bb8ff19e1d5037ae987d1cb11c3d0dc8b7914b012fc418e7f5d16575df7ff312af98c7c0365c8f2d742356
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-