General
-
Target
New -PO January.xlsx
-
Size
2.0MB
-
Sample
210114-dnpxjg3a8n
-
MD5
23bbc2d2c1f6938d9f701bd185ae52b8
-
SHA1
d90da454ef1ba74843356d00190b5232cf848b4f
-
SHA256
1d4245f324118521fb7eb936379da4a25cb5101d5634f21376fa196663efdc35
-
SHA512
5809706d71109adeee4f08980197b1dd7ced0f2dd584eff24a922749139241fc7b04323dfc54552e79cff4e75e77e554d15acbce3c14d96e69510acf17101311
Static task
static1
Behavioral task
behavioral1
Sample
New -PO January.xlsx
Resource
win7v20201028
Behavioral task
behavioral2
Sample
New -PO January.xlsx
Resource
win10v20201028
Malware Config
Extracted
formbook
http://www.thesiromiel.com/kgw/
valentinakasu.com
soyelmatador.com
collaborativeprosperity.com
power8brokers.com
nexus-ink.com
manpasandmeatmarket.com
the-ethical-forums.today
maryannpark.com
bikininbodymommy.com
pxwuo.com
bigbangmerch.com
okaysinger.com
shopcarpe.com
rainbowhillsswimclub.com
crifinmarket.com
ebl-play.net
forceandsonsequipment.com
viagraytqwi.com
latashashop.com
suffocatinglymundanepodcast.com
metanoria.com
camera-kento.com
hotsaledeals.store
outlawgospelshow.com
saisaharashipping.com
buyiprod.com
pestigenix.com
opendesignpodcast.com
patentml.com
covaxbiotech.com
youjar.com
domvy.xyz
remodelmemphis.com
milehighdistributionllc.com
merchandisingpremium.com
fallguysmovile.com
actuelburo.xyz
nedlebow.com
shopcryptocurrency247.com
riellymoore.com
affinitymotorsales.com
akmh.pro
hsrrxs.com
atlanticdentallab.com
sagarpantry.com
murinemodel.com
karybeautycare.com
boshangkeji.com
dailynewstodays.com
oregonpyramids.com
dsjmzyz.com
gidagozlemevi.com
tribelessofficial.com
cyberonica.com
onehourcheckout.com
tenaflypedatrics.com
nbworldfire.com
setyourhead.com
manticore-habitat.com
iqftomatoes.com
fejsearesete.com
gregsgradeaappliancerepair.com
sfmfgco.com
directprnews.com
Targets
-
-
Target
New -PO January.xlsx
-
Size
2.0MB
-
MD5
23bbc2d2c1f6938d9f701bd185ae52b8
-
SHA1
d90da454ef1ba74843356d00190b5232cf848b4f
-
SHA256
1d4245f324118521fb7eb936379da4a25cb5101d5634f21376fa196663efdc35
-
SHA512
5809706d71109adeee4f08980197b1dd7ced0f2dd584eff24a922749139241fc7b04323dfc54552e79cff4e75e77e554d15acbce3c14d96e69510acf17101311
-
Formbook Payload
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-