General
-
Target
ORDER CONFIRMATIONS MAIN STORE USP-PO-2403103 USP-PR-2024.scr.exe
-
Size
1.2MB
-
Sample
240531-jletkscd63
-
MD5
65381bc5947270a4cd95fc31359c70f3
-
SHA1
c9d54bf3730a72f5fa7ab92659ea1874d539297e
-
SHA256
9681f60064bcf9cb185d49d8fc355fa75daef418188f0a20db66a96884f14733
-
SHA512
064d6c12c3123db1c2617ef2f19cbd48a9e52e232b67b9fb992d00c1a056b3ca2030a45e63cd4b49dc4075c8351f1cada740c4c622186fed172aa5cb73b26820
-
SSDEEP
24576:nOdyJRGkkkHmk1538alCRmlCqyKDZae6ts91hO2ak2yrF+BOtu:nSyH9kEmkP35C0lCqFo5S/aklJ+ot
Static task
static1
Behavioral task
behavioral1
Sample
ORDER CONFIRMATIONS MAIN STORE USP-PO-2403103 USP-PR-2024.scr.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ORDER CONFIRMATIONS MAIN STORE USP-PO-2403103 USP-PR-2024.scr.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
ORDER CONFIRMATIONS MAIN STORE USP-PO-2403103 USP-PR-2024.scr.exe
-
Size
1.2MB
-
MD5
65381bc5947270a4cd95fc31359c70f3
-
SHA1
c9d54bf3730a72f5fa7ab92659ea1874d539297e
-
SHA256
9681f60064bcf9cb185d49d8fc355fa75daef418188f0a20db66a96884f14733
-
SHA512
064d6c12c3123db1c2617ef2f19cbd48a9e52e232b67b9fb992d00c1a056b3ca2030a45e63cd4b49dc4075c8351f1cada740c4c622186fed172aa5cb73b26820
-
SSDEEP
24576:nOdyJRGkkkHmk1538alCRmlCqyKDZae6ts91hO2ak2yrF+BOtu:nSyH9kEmkP35C0lCqFo5S/aklJ+ot
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-