General
-
Target
cpdata
-
Size
812KB
-
Sample
240825-whfb6awfpg
-
MD5
36a76a95fdf4a51451f8936aada5f03b
-
SHA1
b6855aef1d5946c050b12764ab4cf02c3c2725c1
-
SHA256
6b393d3b18723dc892ebde8229d7e6efc61a8bee71b22fe717e2e1b109eb3976
-
SHA512
550bfd09ace7ca5e223f0e60e032e11dd41dab71ce25477afd114d50f277d67d524915a365ef17b7d6580e213de80d5ffbff35a06f1dc7aa0c397edf644939fe
-
SSDEEP
12288:55+Hq9mCIVBg0iXlbKai0qtsJdRxG/1uQ2vVfpaDMrJ4raKUmt7W08uBFztgfHr:D+Hq9mBCXlbKassG/oJ9BalOKT7vBjg
Static task
static1
Behavioral task
behavioral1
Sample
cpdata.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
cpdata
-
Size
812KB
-
MD5
36a76a95fdf4a51451f8936aada5f03b
-
SHA1
b6855aef1d5946c050b12764ab4cf02c3c2725c1
-
SHA256
6b393d3b18723dc892ebde8229d7e6efc61a8bee71b22fe717e2e1b109eb3976
-
SHA512
550bfd09ace7ca5e223f0e60e032e11dd41dab71ce25477afd114d50f277d67d524915a365ef17b7d6580e213de80d5ffbff35a06f1dc7aa0c397edf644939fe
-
SSDEEP
12288:55+Hq9mCIVBg0iXlbKai0qtsJdRxG/1uQ2vVfpaDMrJ4raKUmt7W08uBFztgfHr:D+Hq9mBCXlbKassG/oJ9BalOKT7vBjg
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-