General
-
Target
PROFORMA INVOICE210505133444.xlsx
-
Size
804KB
-
Sample
210506-rp25lg34xe
-
MD5
f1564a3a6e6a3227169d136c2652eaf2
-
SHA1
6c17ecc0377cf31207087f53cf4228ed98939d3e
-
SHA256
195f8028bfd632ee22ff9c3e25de3b118f0847fb21fbe91ba722ecbbfa5f2869
-
SHA512
fedfd51564d0f06cc20e068726c6154f1aa380b4c182ab7a423d9ec3690aa13199cc77573cab010b3d61c389ed52470bd6a565a32723cadf2ed1fdad71456522
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE210505133444.xlsx
Resource
win7v20210408
Behavioral task
behavioral2
Sample
PROFORMA INVOICE210505133444.xlsx
Resource
win10v20210410
Malware Config
Extracted
formbook
4.1
http://www.projectx-dev.net/hci/
0357shop.com
cinargenerator.com
freshwes.com
dance-pods.com
cptinsano.com
animaltales1.com
ridernationusa.com
christophergagnon.com
bzjp.icu
culturefap.com
illustrationtees.com
handwritingwork.com
thebullrunranch.com
wujingli.com
wifihouten.online
okavagegroup.com
makaladiggsfitness.com
ruvapy.com
customergirl.com
guangzhoushujukuzxtftf.com
holisticuniversal.com
temizlikciyim.com
hyggespaceco.com
superlucky.site
nizacarssuppliers.net
nanchangbus.com
advertistechnology.com
gerardopadilla.com
kittycrashcourse.com
zhiguanjiaoyu.com
editionsculte.com
tech-bombay.com
haumeya.com
bfsleadership.com
placemybeats.com
contigocosmeticos.com
ajshaonan.com
sun-moana.com
texasfinestfencemore.com
kredtra.net
xadzxx.com
relialed.com
1133nwood1n.info
boysduvetcovers.com
tagenergypartners.com
glz-curatelle.com
krewdog.com
cemexmexico.online
contadortico.com
cepmax.xyz
leanistic.com
financefairyy.com
lelaandcohairstudio.com
lmlwealthmanagement.com
virtual-tokyotower.com
wherecoins.com
simplenskin.com
safecareethiopia.net
out-there-supply.com
beautifulcrete.com
speararts.com
kingsluxuryinternational.com
exoticomistico.com
stoneridgeweddingvenues.com
Targets
-
-
Target
PROFORMA INVOICE210505133444.xlsx
-
Size
804KB
-
MD5
f1564a3a6e6a3227169d136c2652eaf2
-
SHA1
6c17ecc0377cf31207087f53cf4228ed98939d3e
-
SHA256
195f8028bfd632ee22ff9c3e25de3b118f0847fb21fbe91ba722ecbbfa5f2869
-
SHA512
fedfd51564d0f06cc20e068726c6154f1aa380b4c182ab7a423d9ec3690aa13199cc77573cab010b3d61c389ed52470bd6a565a32723cadf2ed1fdad71456522
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-