General
-
Target
AWB_NO_9284730932.xlsx
-
Size
206KB
-
Sample
220504-hn8c8sdbg4
-
MD5
ac51ee7895bdd36274338052fe6eb603
-
SHA1
43386f7306264f0641d4fc7dac0f4759ad3b8d0c
-
SHA256
877d48860111e3ddad04e136fffe054929e54d8d31444b84fe82f1f43b05518c
-
SHA512
745a2adabd5fe71f349fd3863c5101ac8f253312da85aba87868636beb9bd37b269838b36d1ae967819e27f6b7f3f6b1ab282389c3ffc83e6d112868904df73b
Static task
static1
Behavioral task
behavioral1
Sample
AWB_NO_9284730932.xlsx
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
AWB_NO_9284730932.xlsx
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20220414-en
Malware Config
Extracted
formbook
4.1
fw02
payer-breakers.com
thesiscoper.com
rental-villa.com
scovikinnovations.com
hydh33.com
allmyshit.rest
lovejaclyn.com
vanessaruizwriting.com
dufonddelaclasse.com
kiddee168.com
monumentalmarketsllc.com
musclegainfatloss.com
avida.info
cosmo-wellness.net
dandelionfusedigital.com
oversizeloadbanners.com
konstelle.store
sdjnsbd.com
czoqg.xyz
5p6xljjse1lq.xyz
10936.loan
primeiropasso.website
salarydetector.net
the6figureshow.com
ritzluxurytransportation.com
5145.design
web3ido.xyz
starweaverdesigns.com
cbdtz.com
sunwall.xyz
ornitv.com
curateddesignsconsulting.com
businesshairways.biz
willacloud.com
accusecures.com
hl243.com
coffellc.icu
eddrugs2018.com
lidakang.xyz
salesstorecolombia.com
ilina.xyz
partieslikethese.com
peymantasnimi.com
datthocu.xyz
cybertechsolutions.xyz
findy.guru
trybes.space
arulinks.com
yuriookinoart.com
largestjerseysstore.com
fortitude-tech.com
ywfjp.com
b1v097f2avze.xyz
abdullahnazhim.com
zhaoav111.info
cegrowing.com
llaveselmuerto.com
7477e.xyz
chabusinessloans.com
ht-brain.com
app-compound.finance
0085208.com
wewinaccidents.com
ztzfirst.xyz
shishlomarket24.biz
Targets
-
-
Target
AWB_NO_9284730932.xlsx
-
Size
206KB
-
MD5
ac51ee7895bdd36274338052fe6eb603
-
SHA1
43386f7306264f0641d4fc7dac0f4759ad3b8d0c
-
SHA256
877d48860111e3ddad04e136fffe054929e54d8d31444b84fe82f1f43b05518c
-
SHA512
745a2adabd5fe71f349fd3863c5101ac8f253312da85aba87868636beb9bd37b269838b36d1ae967819e27f6b7f3f6b1ab282389c3ffc83e6d112868904df73b
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-
-
-
Target
decrypted
-
Size
199KB
-
MD5
045fef4f9dae5162449cb0dadbf82df1
-
SHA1
6a26ce7489ad95c4fbae05df9d268ff5ceae5498
-
SHA256
bddcd8a65e3a8a5bccf3d39865ed76e7f69e357ca0094b8324f1f3501b975c91
-
SHA512
2d04bfbbe7036dea4e6ae2def0de54fcdecf118d2ec3bc509ecbbd13587f04f50b0a3970eedc682dc77eb1704248484d954612ac7065786e4f86c5e35ae4c222
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-