General
-
Target
f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293
-
Size
12KB
-
Sample
240522-27qgbacf82
-
MD5
8d70c63a8df748a07c9cc2165ba4a0b7
-
SHA1
763339fec7706187868f9a0e889410b1fbe675d3
-
SHA256
f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293
-
SHA512
1b0687f78c82faadc4c952c29435b863901b8ecbb91595ffdaf50eca709d596fc878bc881e29c4bb6af3d23acadf403d873efa21e66e591f159a424b176ecb77
-
SSDEEP
192:oL29RBzDzeobchBj8JON5ONwrudrEPEjr7Ah2:m29jnbcvYJOCWudvr7C2
Static task
static1
Behavioral task
behavioral1
Sample
f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293
-
Size
12KB
-
MD5
8d70c63a8df748a07c9cc2165ba4a0b7
-
SHA1
763339fec7706187868f9a0e889410b1fbe675d3
-
SHA256
f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293
-
SHA512
1b0687f78c82faadc4c952c29435b863901b8ecbb91595ffdaf50eca709d596fc878bc881e29c4bb6af3d23acadf403d873efa21e66e591f159a424b176ecb77
-
SSDEEP
192:oL29RBzDzeobchBj8JON5ONwrudrEPEjr7Ah2:m29jnbcvYJOCWudvr7C2
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-