General
-
Target
SA___CS_Purchase_Order.xls.js
-
Size
7KB
-
Sample
231213-p6xg1sdack
-
MD5
516442412f0c621f39abd64b645f587c
-
SHA1
20565fcbcf30ced136c6e6a9c6539a139f610233
-
SHA256
3dbe569606e7cb9d93ad9f5bb8135fb9e6faf2d525c365dbc0eb672a45419ff9
-
SHA512
3d96d973e3a1a6bca2cdd982e50524c3d1b79df03eedd1165ecae94d408fdd12a1f14a9b4fb7660f71e0be912ba469e1e4f88b42f8f6c66758f8e2d16342b1e6
-
SSDEEP
48:MOIWNECVZvY3thH1S4T0O2NiIVEggU3mOOFANEeoTmKaU9Osxi4OcKGE+G:zYCVZ+FTbmVEgg+u9Ny8MXV+G
Static task
static1
Behavioral task
behavioral1
Sample
SA___CS_Purchase_Order.xls.js
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
SA___CS_Purchase_Order.xls.js
Resource
win10v2004-20231127-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
SA___CS_Purchase_Order.xls.js
-
Size
7KB
-
MD5
516442412f0c621f39abd64b645f587c
-
SHA1
20565fcbcf30ced136c6e6a9c6539a139f610233
-
SHA256
3dbe569606e7cb9d93ad9f5bb8135fb9e6faf2d525c365dbc0eb672a45419ff9
-
SHA512
3d96d973e3a1a6bca2cdd982e50524c3d1b79df03eedd1165ecae94d408fdd12a1f14a9b4fb7660f71e0be912ba469e1e4f88b42f8f6c66758f8e2d16342b1e6
-
SSDEEP
48:MOIWNECVZvY3thH1S4T0O2NiIVEggU3mOOFANEeoTmKaU9Osxi4OcKGE+G:zYCVZ+FTbmVEgg+u9Ny8MXV+G
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-