General
-
Target
Payroll Admin.vbs
-
Size
1.1MB
-
Sample
240531-k41z7sdb31
-
MD5
fdd823fe582e2a3f2649f8b906346c03
-
SHA1
fbe1fc6dffa55104e784c7bc3b6310cb3f027779
-
SHA256
e6d0dcb24822d671a1a8c9e62435211abadf9590278270ac9fc97cd8ff5bcac0
-
SHA512
62283073f27e597fe9b8a5ba6da2c1581b7bf82e250d983891fe7e6e7703d71dd5ccebc1866ce7ada2ab62c447ef3c328523e4532a418ff20380ae0e284e376c
-
SSDEEP
12288:w31cvBzbU01qal638iNX3iTMgmuYtWN/ZgMiQPeRj6w5:wYz64+2Sjv
Static task
static1
Behavioral task
behavioral1
Sample
Payroll Admin.vbs
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Payroll Admin.vbs
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Payroll Admin.vbs
-
Size
1.1MB
-
MD5
fdd823fe582e2a3f2649f8b906346c03
-
SHA1
fbe1fc6dffa55104e784c7bc3b6310cb3f027779
-
SHA256
e6d0dcb24822d671a1a8c9e62435211abadf9590278270ac9fc97cd8ff5bcac0
-
SHA512
62283073f27e597fe9b8a5ba6da2c1581b7bf82e250d983891fe7e6e7703d71dd5ccebc1866ce7ada2ab62c447ef3c328523e4532a418ff20380ae0e284e376c
-
SSDEEP
12288:w31cvBzbU01qal638iNX3iTMgmuYtWN/ZgMiQPeRj6w5:wYz64+2Sjv
Score8/10-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-