General
-
Target
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xlsx
-
Size
688KB
-
Sample
221127-wbwessah9y
-
MD5
64af151191f5d60b7ace7a8cb31e7948
-
SHA1
82c8c29ab11837559b42a7565e6fa14668dc9ece
-
SHA256
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd
-
SHA512
6e34005d4dce744969886be0dae13d653ae3dd9632e539b94bc5891b90b48b450cf4d1105ec8b2f6cf9a3dfbe859bca0cad102fae4b2925d03ec1f3d0927e94e
-
SSDEEP
6144:6KmZ+RwPONXoRjDhIcp0fDlavx+W26nADOiYsPKcK7jtlSEKWiWJKL4lHWyy5zJ+:6KrpM3STW7jbqzJVzNJ0hDkZpI7Z
Static task
static1
Behavioral task
behavioral1
Sample
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
formbook
8hj6
BPkphuLe3gBqfzJH1ZS0lzbRYw==
AMTxHcVHvLNwyogVF8SBkayHurU=
LOpN3n9Pjs2UI+oi1TMRyKqm1zr7Wg==
JDMgT/Us5w/NixQ=
MPSFlLYAFB3z
WeAEPsYnuT4RqJgSAw==
Cc9tepEFmnhatTrwHgQbNHQ=
iCGVsr8Lk3gUwXgo
+YX0IkWtcWZX445/IabQ
dFLJMtQdnup8p2CMDw==
TQ/GAhh5CP3nUMd/IabQ
g1OUvdLuvC4imZZbVQXxyGML
FRedytsqrpCA+9wIZeeMmayHurU=
k5OZ54nDlIIUwXgo
GCU1ZPY+TeKX9582
KvKuwGN8c9vk
o2mQnTrCiPq9omMhmTs=
SQ9FZuwk+GJXWA==
r03GDqMLl/PfqJgSAw==
2tPB6oKzhZBJmlhnzZUMHGk=
m2+cvlLotTEH66dwwkfq/WE=
q3caVHGpd7d1h9OXbjDFZA==
CRGk4vAfn6OJnUxqLhjQbg==
iWMbTe8F093BLqgO+ngcJlwNcKgjq6I=
fHqNrj+hK31YVwYQVdl8mKyHurU=
PdFOeITSUjj1WEJLw3odMKVyX5F+
gHn3IoVsNQfq
0Y0lPEaAWN7HfkZSpCo=
Ft3VK8QtvDcOqJgSAw==
ny+2CCpZZ4h9ggQ=
8vCHz/dK0J+cVlpl4BZRZg==
98HN23DUX+CP449/IabQ
WGVedgdp92Vib1sSAzVoM2UXdA==
jE+V0GLTkxnImVpuLhjQbg==
fH+MwGjhar95VkX4LhjQbg==
3KDpKcpkboxv3ZwwAA7MHPGW+vnCAKouQw==
bXNpgCfFQCUAWsd/IabQ
WeJovNkMktqDiww=
CNQjaw2BF4tXLu0g1k4JHWs=
AM32FLEjqfXfqJgSAw==
S005UdC8wI5lSg==
gIUeW4T7sZVUnRX9p8/gAWE=
FNsfiOcKA2cn0lj2NhG2aX4=
XfbL44O1hmVWT0T4LhjQbg==
5XPc6AuxLqeGxIQ5ExLY
ozOAzufTpw4=
PTo/bwZc6GJoYhQ1m5UMHGk=
e0gXXXrqnoNmT0T5LhjQbg==
5+m8191WIjXyVUVo75EqS9G+8l9n
jpkCKLEl5m8dqJgSAw==
bHflHKQKjOWqVlpl4BZRZg==
LgPADjaSkE8imlBcyZUMHGk=
JzZS0vwAFB3z
QU3iMYZkPMevwXvB+x9GYQ==
dD/hEBtT0LBtYBvwayI=
dgeEpazuc3NJsHgPFqg/YKyTAGJRH/mE
4X/R7YIBkgy1EwuLbTU=
3HPyGydx7cuN+7yxHxkPqkoD
o20ZSVqSZdmenJww
gocUQ1y7SSncoWUi
EB0uTu91NpyA7RvwayI=
Q0kkM8HLjYcUwXgo
BQuX5AItCpV/i0lot5UMHGk=
TRNzvtwlr5tmypR/IabQ
paulmontecalvo.com
Targets
-
-
Target
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xlsx
-
Size
688KB
-
MD5
64af151191f5d60b7ace7a8cb31e7948
-
SHA1
82c8c29ab11837559b42a7565e6fa14668dc9ece
-
SHA256
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd
-
SHA512
6e34005d4dce744969886be0dae13d653ae3dd9632e539b94bc5891b90b48b450cf4d1105ec8b2f6cf9a3dfbe859bca0cad102fae4b2925d03ec1f3d0927e94e
-
SSDEEP
6144:6KmZ+RwPONXoRjDhIcp0fDlavx+W26nADOiYsPKcK7jtlSEKWiWJKL4lHWyy5zJ+:6KrpM3STW7jbqzJVzNJ0hDkZpI7Z
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-