General
-
Target
LPC Scanned Docs-Copyright ©GNP.CPL.exe
-
Size
4KB
-
Sample
241118-jmhxma1rd1
-
MD5
3416cd045697fbdce8ee3af98e0c8d81
-
SHA1
b488215ca71436c17f9b75559a46bc37f812d1bf
-
SHA256
1a12342028912118504c3efb1145c4bc713cca6eb591866f26b2d7d9adc192ca
-
SHA512
2e4ec4a4fb29397966a9336d0d0731f97db60225a4807c13543c9a3e60e1bdec073a468d76257fae78e73cf0d4c34eccf7481185266a2325dcfb6a6707336bc2
Static task
static1
Behavioral task
behavioral1
Sample
LPC Scanned Docs-Copyright ©GNP.CPL.dll
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
194.11.246.69:6606
194.11.246.69:7707
194.11.246.69:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Notepad.exe
-
install_folder
%AppData%
Targets
-
-
Target
LPC Scanned Docs-Copyright ©GNP.CPL.exe
-
Size
4KB
-
MD5
3416cd045697fbdce8ee3af98e0c8d81
-
SHA1
b488215ca71436c17f9b75559a46bc37f812d1bf
-
SHA256
1a12342028912118504c3efb1145c4bc713cca6eb591866f26b2d7d9adc192ca
-
SHA512
2e4ec4a4fb29397966a9336d0d0731f97db60225a4807c13543c9a3e60e1bdec073a468d76257fae78e73cf0d4c34eccf7481185266a2325dcfb6a6707336bc2
-
Asyncrat family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-