General
-
Target
x4hostTesT.exe
-
Size
748KB
-
Sample
240715-k2a11a1gkc
-
MD5
41c2809934950af9e2634aa54cbffe17
-
SHA1
680229680df803f57b469f1131523405bc69682e
-
SHA256
b4d7cdcabead94586770c0a211fe3083419ae2856422bade3e5e2d30611e5660
-
SHA512
72c38ce481db3f2cb97e34247a2e556f80e5b0d2a48d5c83b9138cb1ce2b81f09425a1537fd52adacf4de67b46ccb24433d76fe5f3145e6fd12151164dbd3cc9
-
SSDEEP
12288:Fmj33G0OKtrxdx6TOVVPatXNFiRuOSBXWfIA6xlca+Wx5Ru7xC7Jm3wkCbK2m1XO:AjG0OKtrYTcitoBSwfITxearx55JmAZL
Static task
static1
Behavioral task
behavioral1
Sample
x4hostTesT.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
x4hostTesT.exe
-
Size
748KB
-
MD5
41c2809934950af9e2634aa54cbffe17
-
SHA1
680229680df803f57b469f1131523405bc69682e
-
SHA256
b4d7cdcabead94586770c0a211fe3083419ae2856422bade3e5e2d30611e5660
-
SHA512
72c38ce481db3f2cb97e34247a2e556f80e5b0d2a48d5c83b9138cb1ce2b81f09425a1537fd52adacf4de67b46ccb24433d76fe5f3145e6fd12151164dbd3cc9
-
SSDEEP
12288:Fmj33G0OKtrxdx6TOVVPatXNFiRuOSBXWfIA6xlca+Wx5Ru7xC7Jm3wkCbK2m1XO:AjG0OKtrYTcitoBSwfITxearx55JmAZL
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-