General
-
Target
new order.xlsx
-
Size
229KB
-
Sample
211122-jhjy5aaab7
-
MD5
174076e22d5f7e23c9dcc97309b3f0a3
-
SHA1
9762d9dc1be6472e1bc9ede05c10ed260f1e5766
-
SHA256
91e91ca82d963719f1c76ed7359ed34b3296901c26709a0ff9145c2a283601c4
-
SHA512
3a32abc7fb70cc017ef70c153650ba4d6ed47f5f48962917b216511d80a2bdffc71c8c66d34539ba7ed78b285277efc693596522336c1f6ce2bf981fb2fb58ae
Static task
static1
Behavioral task
behavioral1
Sample
new order.xlsx
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
new order.xlsx
Resource
win10-en-20211104
Malware Config
Extracted
formbook
4.1
9gr5
http://www.cuteprofessionalscrubs.com/9gr5/
newleafcosmetix.com
richermanscastle.com
ru-remonton.com
2diandongche.com
federaldados.design
jeffreycookweb.com
facecs.online
xmeclarn.xyz
olgasmith.xyz
sneakersonlinesale.com
playboyshiba.com
angelamiglioli.com
diitaldefynd.com
whenevergames.com
mtheartcustom.com
vitalactivesupply.com
twistblogr.com
xn--i8s140at3d6u7c.tel
baudelaireelhakim.com
real-estate-miami-searcher.site
131122.xyz
meta-medial.com
carvanaworkers.com
mimamincloor.com
aglutinarteshop.com
portal-arch.com
mandeide.com
golfteesy.com
carteretcancer.center
cuansamping.com
jhhnet.com
oetthalr.xyz
toesonly.com
ctbizmag.com
searchonzippy.com
plantedapts.com
matoneg.online
takened.xyz
meta4.life
africanizedfund.com
jukeboxjason.com
folez.online
troddu.com
802135.com
guiamat.net
gladiasol.com
meditationandyogacentre.com
metaverserealestateagent.com
boogyverse.net
melissa-mochafest.com
cozsweeps.com
pickles-child.com
metaversemediaschool.com
ahfyfz.com
ses-coating.com
pozada.biz
loldollmagic.com
mountfrenchlodge.net
25680125.xyz
inusuklearning.com
dnteagcud.xyz
yupan.site
acloud123.xyz
asadosdonchorizo.com
Targets
-
-
Target
new order.xlsx
-
Size
229KB
-
MD5
174076e22d5f7e23c9dcc97309b3f0a3
-
SHA1
9762d9dc1be6472e1bc9ede05c10ed260f1e5766
-
SHA256
91e91ca82d963719f1c76ed7359ed34b3296901c26709a0ff9145c2a283601c4
-
SHA512
3a32abc7fb70cc017ef70c153650ba4d6ed47f5f48962917b216511d80a2bdffc71c8c66d34539ba7ed78b285277efc693596522336c1f6ce2bf981fb2fb58ae
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-