General
-
Target
OneDrive.exe
-
Size
270.2MB
-
Sample
240927-x16shaxemh
-
MD5
8a1d83bd60b0bf8b9ab7aa48951023e8
-
SHA1
af1fa47081d87d972b970851a6a55bcdd5db2050
-
SHA256
fb4b4f1d5eff5554690fef39a65a76255e6c5587ddc98499ab3a7850b507cbfd
-
SHA512
b4042b8b17c75af7984e06678efd871c1670bba74ca07b403bb0a03497e804905f2d0a72c022071f836605bf1cb95884672cdcd1d62111a7ea5f203e43e89d9f
-
SSDEEP
6291456:mHqyRktm833OwpWtAmlVKllT1wpzVX97XBf7ekh6PAGU:nyRkthewpWtxlV21wppX97RF64T
Static task
static1
Behavioral task
behavioral1
Sample
OneDrive.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
OneDrive.exe
-
Size
270.2MB
-
MD5
8a1d83bd60b0bf8b9ab7aa48951023e8
-
SHA1
af1fa47081d87d972b970851a6a55bcdd5db2050
-
SHA256
fb4b4f1d5eff5554690fef39a65a76255e6c5587ddc98499ab3a7850b507cbfd
-
SHA512
b4042b8b17c75af7984e06678efd871c1670bba74ca07b403bb0a03497e804905f2d0a72c022071f836605bf1cb95884672cdcd1d62111a7ea5f203e43e89d9f
-
SSDEEP
6291456:mHqyRktm833OwpWtAmlVKllT1wpzVX97XBf7ekh6PAGU:nyRkthewpWtxlV21wppX97RF64T
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-