General
-
Target
Honey ORDER.xlsx
-
Size
1.4MB
-
Sample
210430-f7cq1ttnee
-
MD5
b0acb4945db74ef13b18c1a070e23199
-
SHA1
0e892062df26a3f14bc88d79ebc7fd8ecddc5009
-
SHA256
bc49a8d949163802d2b46f08a0998a39376cc5bde24377c4d40e11b8bc4e2409
-
SHA512
8a40435b65c4641eb207cf92f7c9b722186e51e0f1def0cee2053c1f3b990184cae86b7ed02f9da9e8fcef0ef7ca9f95c757570b396a65cc498dbb9a5c2b5b4e
Static task
static1
Behavioral task
behavioral1
Sample
Honey ORDER.xlsx
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Honey ORDER.xlsx
Resource
win10v20210408
Malware Config
Extracted
formbook
4.1
http://www.evolvekitchendesign.com/ffw/
unmutedgenerations.com
localmoversuae.com
centralrea.com
geyyfphzoe.com
silverpackfactory.com
techtronixx.com
shop-deinen-deal.com
buehne.cloud
inspirefreedomtoday.com
chapelcouture.com
easton-taiwan.com
quanaonudep.store
merzigomusic.com
wpzoomin.com
service-lkytrsahdfpedf.com
yeasuc.com
mydogtrainingservice.com
galeribisnisonline.com
cscremodeling.com
bom-zzxx.com
ensobet88.com
vegancto.com
digivisiol.com
advancetools.net
gzqyjd.com
xtgnsl.com
ftfortmyers.com
g-siqueira.com
ufdzbhrxk.icu
tiekotiin.com
youschrutedit.com
takahatadenkikouji.com
goodfastco.com
jtelitetraining.com
planet-hype.com
gigwindow.com
levelxpr.com
besttechmobcomm.info
funneldesigngenie.com
mylisting.cloud
alltwoyou.com
mortgagesandprotection.online
monthlydigest.info
senlangdq.com
postphenomenon.com
slymwhite.com
masonpreschool.com
wahooshop.com
meridiangummies.com
samsungpartsdept.com
saludbellezaybienestar.net
vickifoxproductions.com
shawandwesson.info
nutrepele.com
gorillatanks.com
praktijkinfinity.online
lanteredam.com
refinedmanagement.com
tiwapay.com
fruitsinbeers.com
charliekay.net
realironart.com
sonsofmari.com
kedingtonni.com
Targets
-
-
Target
Honey ORDER.xlsx
-
Size
1.4MB
-
MD5
b0acb4945db74ef13b18c1a070e23199
-
SHA1
0e892062df26a3f14bc88d79ebc7fd8ecddc5009
-
SHA256
bc49a8d949163802d2b46f08a0998a39376cc5bde24377c4d40e11b8bc4e2409
-
SHA512
8a40435b65c4641eb207cf92f7c9b722186e51e0f1def0cee2053c1f3b990184cae86b7ed02f9da9e8fcef0ef7ca9f95c757570b396a65cc498dbb9a5c2b5b4e
-
Formbook Payload
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-