General
-
Target
Quoation.docx
-
Size
10KB
-
Sample
220725-k5dw3abgen
-
MD5
d0b7db914dac28f48dc17ab867230d2a
-
SHA1
e6d0e5a89b4ceca869067bbbbfcb548405c024c4
-
SHA256
69ed08cfd443483118cc4ad0c33957835f3a09ea2efa5044479b26468fc80e15
-
SHA512
3152364189b61d60a9d33d3f5bc2ae8c6a55fbaa3940f2f807b3f6ffae9621eda898fd410c0ba9c1154d057473faf210b3dd2c7f1fc2f07b1b374f59d226e539
Static task
static1
Behavioral task
behavioral1
Sample
Quoation.docx
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Quoation.docx
Resource
win10v2004-20220721-en
Malware Config
Extracted
formbook
4.1
g2fg
snowcrash.website
pointman.us
newheartvalve.care
drandl.com
sandspringsramblers.com
programagubernamental.online
boja.us
mvrsnike.com
mentallyillmotherhood.com
facom.us
programagubernamental.store
izivente.com
roller-v.fr
amazonbioactives.com
metaverseapple.xyz
5gt-mobilevsverizon.com
gtwebsolutions.co
scottdunn.life
usdp.trade
pikmin.run
cardano-dogs.com
bf2hgfy.xyz
teslafoot.com
rubertquintana.com
wellsfargroewards.com
santel.us
couponatonline.com
theunitedhomeland.com
pmstnly.com
strlocal.com
shelleysmucker.com
youser.online
emansdesign.com
usnikeshoesbot.top
starfish.press
scotwork.us
metamorgana.com
onyxbx.net
rivas.company
firstcoastalfb.com
onpurposetraumainformedcare.com
celimot.xyz
jecunikepemej.rest
lenovolatenightit.com
unitedsterlingcompanyky.com
safety2venture.us
facebookismetanow.com
scottdunn.review
mentallyillmotherhood.com
firstincargo.com
vikavivi.com
investmenofpairs.club
nexans.cloud
farcloud.fr
ivermectinforhumans.quest
5gmalesdf.sbs
majenta.info
6vvvvvwmetam.top
metafirstclass.com
firstcoinnews.com
btcetffutures.online
funinfortmyers.com
mangoirslk.top
metaversebasicprivacy.com
blancheshelley.xyz
Targets
-
-
Target
Quoation.docx
-
Size
10KB
-
MD5
d0b7db914dac28f48dc17ab867230d2a
-
SHA1
e6d0e5a89b4ceca869067bbbbfcb548405c024c4
-
SHA256
69ed08cfd443483118cc4ad0c33957835f3a09ea2efa5044479b26468fc80e15
-
SHA512
3152364189b61d60a9d33d3f5bc2ae8c6a55fbaa3940f2f807b3f6ffae9621eda898fd410c0ba9c1154d057473faf210b3dd2c7f1fc2f07b1b374f59d226e539
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-