General
-
Target
21112024_0910_Tender_procurement_product_order__21_11_2024_.vbs.zip
-
Size
10KB
-
Sample
241121-k5bfya1jds
-
MD5
5e7c09de7828e20e3d6446c7d4707731
-
SHA1
a52ab95073087e20f3295416e9ac2ce3a4a3684c
-
SHA256
d6d4f3700501be46a84da94af0de778f54ccfdabde68b649614de404aeeaa74b
-
SHA512
9f1e75c2dd7a9310e4b7090c68b010b96ca55cba5484dc2b2d8f25647b79abd2019514a4a3cd5baec415827f5eb0ddb72cffcf61f6c80d31ebe2e23a411c9dc6
-
SSDEEP
192:sXLFxKJg05RdscM21HeixE0k269FiXKvnPu/Q7YusHlGAyDmjrTUsRby:sXLOn/d+2d1k26WmGQ7EyDmj/Ny
Static task
static1
Behavioral task
behavioral1
Sample
Tender_procurement_product_order__21_11_2024_.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Tender_procurement_product_order__21_11_2024_.vbs
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Tender_procurement_product_order__21_11_2024_.vbs
-
Size
28KB
-
MD5
e287e89a039bac210a685df3a02acf18
-
SHA1
f835a3e07e7e0343c8ef323365e94967b60eae1f
-
SHA256
ca82b1e207de187c0e8f7ecf45397c1b2161f97a6ef7909616700c3bfc97aa10
-
SHA512
93c29f68bab89ada12554bffd8822f9c7e90a5a69d9b4c9a49374c991236c8cc32bfb7c496e67abb2efe0f584a125cff58380eb46e73feb36fc1efdc657642ca
-
SSDEEP
384:f9xA7f2VAt1fwEpk6RQ2LpnVYnZIRB87rNfSZyiLPTG3pKxR:f9x4+IwIQ2LlQZEBCrFlpKr
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-