General
-
Target
Inquiry Items.pdf.rar
-
Size
1KB
-
Sample
240802-l75cgavdnj
-
MD5
fda665accae0c03bb3cf7d271ea8f054
-
SHA1
b7d21860ca5fdec25a04fd168678ff9b1ce2153f
-
SHA256
81c7418f670e9e11c96094e24b35f58b37767e58e75c00866db1d2fe471b77f7
-
SHA512
d98b08f78ade5653abef2b770cf193c00b9d6b43a603d1a12561aa1c3b3ede5dd6c3cca9a5addd50032f6f4c69c220a29fd38b00539240d21f61c616487638f7
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry Items.pdf.lnk
Resource
win7-20240708-en
Malware Config
Extracted
https://dq8d.shop/YRAZiDez/hta182024.hta
Extracted
https://dq8d.shop/YRAZiDez/hta182024.hta
Targets
-
-
Target
Inquiry Items.pdf.lnk
-
Size
3KB
-
MD5
f2bbeb375a6d74abd720c40702af7446
-
SHA1
42956957fcf61560d4871f5d819d30de12663fb4
-
SHA256
d5316a106da0577abdd0d1c901c0d26793bac9933eb6ca55a42e22c08ad29ad0
-
SHA512
cddc5bf3a8df6844720bea808d9786b5d2fc0b15baf990ef48481e6ccf4a157000d4d437c7f1975ceb22e3c47850476ffdf319db7d7c10782c3f1336b1f8d8b6
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2