General
-
Target
invoice#2022091308##.docx.doc
-
Size
10KB
-
Sample
220919-htr87shcfj
-
MD5
130181c1c46545bd9a2c6245e71ebb92
-
SHA1
20e11cc3cf525647a14a5f5f2de8f3b76d7e8c2c
-
SHA256
76d8c2850110df1226575166f39072edd1baeb1336e17a66333321b41c94bc3e
-
SHA512
b036e240fac33e9b74fba4200b360e1cab67673c53e8deec76afbaeaadd144f8e4d80a262de5ff5da5730c93e3caf16c3cc85e452ca8c26e32b7e29e75d37324
-
SSDEEP
192:ScIMmtPf+CUG/bA3/w2OrrdlJFmQDZ7rhhap30sXN:SPXumAOrjJFmIZfhMF/
Static task
static1
Behavioral task
behavioral1
Sample
invoice#2022091308##.docx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
invoice#2022091308##.docx
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://1806450061/...----------------------.................-----------------------......-------/...........77.doc
Extracted
formbook
4.1
sde7
lolfilmfestival.com
pousdaobosque.com
tangierfilm.com
valuedassist.com
qcrluxuryrentals.com
poc4cloudx.com
irizh.art
flowsever.com
serios-lifestyle.com
abc-diomain.com
bmwoemwarehouse.com
vivelamoda.com
thesycorax.online
goodjob129.com
hudyeanamaze.com
pabcp.com
millennialworkouts.com
gpcr-compound-library.com
rotyupin.xyz
hnkcsm.com
tgcsi.com
atfirstbank.com
kk-casemanagement.com
holiie.online
collier-secret-sept-cieux.com
evibnb.com
bestfortherest.icu
courier-order.info
hrcpetrol.com
impresaallitaliana.com
primaldirective.com
ezpromolink.com
stgilesjms.co.uk
bolometrics.com
pura-vida-apts.com
mumbaitowingservice.com
coloradomicrogreens.net
wallarts.space
yahtjd.com
digitalkreativeco.com
skopeintechnology.com
casalindatabletop.com
handmadebeauty.net
thc-olie-shop.store
xel-toys.com
youngqueen.club
maltepeescort.club
weylanstroic.xyz
kingdombuilders-group.com
strange-ratings.com
yuma-airbox.com
biuysjcims.icu
itsourworld.biz
seobet.online
decisionsandplanning.com
blanka.beauty
hsbanye.com
2elevenmezcal.co.uk
liveoutloud4u.com
ronlynngardens.com
resorttag.com
marcelldiahwedding.faith
ez-lyfe.net
celebrityauctions.net
paidpertv.biz
Targets
-
-
Target
invoice#2022091308##.docx.doc
-
Size
10KB
-
MD5
130181c1c46545bd9a2c6245e71ebb92
-
SHA1
20e11cc3cf525647a14a5f5f2de8f3b76d7e8c2c
-
SHA256
76d8c2850110df1226575166f39072edd1baeb1336e17a66333321b41c94bc3e
-
SHA512
b036e240fac33e9b74fba4200b360e1cab67673c53e8deec76afbaeaadd144f8e4d80a262de5ff5da5730c93e3caf16c3cc85e452ca8c26e32b7e29e75d37324
-
SSDEEP
192:ScIMmtPf+CUG/bA3/w2OrrdlJFmQDZ7rhhap30sXN:SPXumAOrjJFmIZfhMF/
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-