General
-
Target
Quotation.xlsx
-
Size
176KB
-
Sample
220126-pnw4jadbd6
-
MD5
fbabc7960bfc286e617f03b4afc97f91
-
SHA1
2835e9b293dff1d61096a7f6d44c068e2a8c1eb4
-
SHA256
43dfdf1d47b81747c11e3340969201c90ea08b7d25505c292cb3dfcedfc89df4
-
SHA512
b54765759169ff14f8945ae995ecd5a40663f78acf556d70c640c167d1dd9241f6d3dca9c265fb3adbad5e5adc65772763ab0ffe04df609f73d9bbb4b6d43471
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.xlsx
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Quotation.xlsx
Resource
win10-en-20211208
Malware Config
Extracted
formbook
4.1
g2fg
snowcrash.website
pointman.us
newheartvalve.care
drandl.com
sandspringsramblers.com
programagubernamental.online
boja.us
mvrsnike.com
mentallyillmotherhood.com
facom.us
programagubernamental.store
izivente.com
roller-v.fr
amazonbioactives.com
metaverseapple.xyz
5gt-mobilevsverizon.com
gtwebsolutions.co
scottdunn.life
usdp.trade
pikmin.run
cardano-dogs.com
bf2hgfy.xyz
teslafoot.com
rubertquintana.com
wellsfargroewards.com
santel.us
couponatonline.com
theunitedhomeland.com
pmstnly.com
strlocal.com
shelleysmucker.com
youser.online
emansdesign.com
usnikeshoesbot.top
starfish.press
scotwork.us
metamorgana.com
onyxbx.net
rivas.company
firstcoastalfb.com
onpurposetraumainformedcare.com
celimot.xyz
jecunikepemej.rest
lenovolatenightit.com
unitedsterlingcompanyky.com
safety2venture.us
facebookismetanow.com
scottdunn.review
mentallyillmotherhood.com
firstincargo.com
vikavivi.com
investmenofpairs.club
nexans.cloud
farcloud.fr
ivermectinforhumans.quest
5gmalesdf.sbs
majenta.info
6vvvvvwmetam.top
metafirstclass.com
firstcoinnews.com
btcetffutures.online
funinfortmyers.com
mangoirslk.top
metaversebasicprivacy.com
blancheshelley.xyz
Targets
-
-
Target
Quotation.xlsx
-
Size
176KB
-
MD5
fbabc7960bfc286e617f03b4afc97f91
-
SHA1
2835e9b293dff1d61096a7f6d44c068e2a8c1eb4
-
SHA256
43dfdf1d47b81747c11e3340969201c90ea08b7d25505c292cb3dfcedfc89df4
-
SHA512
b54765759169ff14f8945ae995ecd5a40663f78acf556d70c640c167d1dd9241f6d3dca9c265fb3adbad5e5adc65772763ab0ffe04df609f73d9bbb4b6d43471
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-