General
-
Target
New Purchase Order.rtf
-
Size
66KB
-
Sample
241203-p88m3awpas
-
MD5
52b9edce3719a332f117735c74d70b27
-
SHA1
027c2f05b720790bd29b96a54c42ea9625c6291d
-
SHA256
7e123df6e3f5b7c3f91c57a9f7d7511db49e7f406e0f479df405cbc86ab92898
-
SHA512
8ecbac8a98ba0369752ee4fa4a1fa8e48573d5cb4f3fa76d14059d9e1d7aa43fa9dcf18524c11b9cb2bb3b07011477239531934de54162dd44ce1f7e578fe848
-
SSDEEP
192:Tu+MOxqg6kYkpt5JwYiXyMAoyO7ttFFFFhxPWg6mKIxRpBPmwK2aYR8+m8qPHljr:5gkptLPiXjAoyGV/Ilf/E4kSTN
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Purchase Order.rtf
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
New Purchase Order.rtf
-
Size
66KB
-
MD5
52b9edce3719a332f117735c74d70b27
-
SHA1
027c2f05b720790bd29b96a54c42ea9625c6291d
-
SHA256
7e123df6e3f5b7c3f91c57a9f7d7511db49e7f406e0f479df405cbc86ab92898
-
SHA512
8ecbac8a98ba0369752ee4fa4a1fa8e48573d5cb4f3fa76d14059d9e1d7aa43fa9dcf18524c11b9cb2bb3b07011477239531934de54162dd44ce1f7e578fe848
-
SSDEEP
192:Tu+MOxqg6kYkpt5JwYiXyMAoyO7ttFFFFhxPWg6mKIxRpBPmwK2aYR8+m8qPHljr:5gkptLPiXjAoyGV/Ilf/E4kSTN
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-