General

  • Target

    Inv 070324.exe

  • Size

    755KB

  • Sample

    240507-jz1m7sag56

  • MD5

    4e96cb7f48fc8c4ac06a1cf484e85e4d

  • SHA1

    0d6fff464505680dd3e58b360cb0b13e5c55c3de

  • SHA256

    d1277cf74db30d16884abaf7a0f487374f63aba610e1a966da28e71a421db7ab

  • SHA512

    fc85a23f5acebc843a256b39a84b9a5cb6893c942f9abf72aa27c3429a5a3c5c209bc4f9ca20126fbc4041aeb35ff16ff120ae345558aad1e9cfe080fbe389a5

  • SSDEEP

    12288:Oo6giAEfDdJ19MN8oKhKSDOM03nkRjQ5XBS7jLJHrsSU2iVDbiIXBYx9fIkR:0gRE7dJ1GRZXkNUS3LtrsSMVDbiIRG9n

Score
8/10

Malware Config

Targets

    • Target

      Inv 070324.exe

    • Size

      755KB

    • MD5

      4e96cb7f48fc8c4ac06a1cf484e85e4d

    • SHA1

      0d6fff464505680dd3e58b360cb0b13e5c55c3de

    • SHA256

      d1277cf74db30d16884abaf7a0f487374f63aba610e1a966da28e71a421db7ab

    • SHA512

      fc85a23f5acebc843a256b39a84b9a5cb6893c942f9abf72aa27c3429a5a3c5c209bc4f9ca20126fbc4041aeb35ff16ff120ae345558aad1e9cfe080fbe389a5

    • SSDEEP

      12288:Oo6giAEfDdJ19MN8oKhKSDOM03nkRjQ5XBS7jLJHrsSU2iVDbiIXBYx9fIkR:0gRE7dJ1GRZXkNUS3LtrsSMVDbiIRG9n

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks