General
-
Target
Our order 230310-03SNTEK-JJWP.xls
-
Size
1.1MB
-
Sample
230323-r76hesgd62
-
MD5
3807b929d4fdccbb0c863c2f5ebc625c
-
SHA1
90b03cf0c970b507be7239957754626cc0418122
-
SHA256
ad00bf202413a51629e0bf7e0b4d48cdf6a59004dee2cad317d1f01526c5f712
-
SHA512
b79b02643469bdd613e84bc4cc6c6caa7d3d6de980e576c7fbb55a5ae05e040bba230a74e23678516eda2b4a1680bc0d477920faaa3be1d60e72be99c6788af2
-
SSDEEP
24576:hLKwWQmmav30xH+MXU6dN+MXUw3bV++MXU23bV0OWUSngfeTw:hLKFQmmQ30t+MXH+MXL3bV++MXl3bVF+
Static task
static1
Behavioral task
behavioral1
Sample
Our order 230310-03SNTEK-JJWP.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Our order 230310-03SNTEK-JJWP.xls
Resource
win10v2004-20230220-en
Malware Config
Extracted
formbook
4.1
ar73
classgorilla.com
b6817.com
1wwuwa.top
dgslimited.africa
deepwaterships.com
hkshshoptw.shop
hurricanevalleyatvjamboree.com
ckpconsulting.com
laojiangmath.com
authenticityhacking.com
family-doctor-53205.com
investinstgeorgeut.com
lithoearthsolution.africa
quickhealcareltd.co.uk
delightkgrillw.top
freezeclosettoilet.com
coo1star.com
gemgamut.com
enrichednetworksolutions.com
betterbeeclean.com
kbmstr.com
colorusainc.com
five-dollar-meals.com
baozhuang8.com
la-home-service.com
innovantexclusive.com
chateaudevillars.co.uk
echadholisticbar.com
naijacarprices.africa
4652.voto
kraftheonz.com
ingrambaby.com
braeunungsoel.ch
sweetcariadgifts.co.uk
kui693.com
akatov-top.ru
epollresearch.online
cupandsaucybooks.com
arredobagno.club
gt.sale
dskincare.com
cursosemcasa.site
leaf-spa.net
deathbeforedeceit.com
azvvs.com
laptops-39165.com
ccwt.vip
011965.com
mtevz.online
jacksontcpassettlement.com
aldeajerusalen.com
kellnovaglobalfood.info
alphametatek.online
lcssthh.com
dumelogold9ja.africa
d-storic.com
mogi.africa
ghostt.net
aksharsigns.online
goglucofort.com
b708.com
controlplus.systems
lightandstory.info
invstcai.sbs
2348x.com
Targets
-
-
Target
Our order 230310-03SNTEK-JJWP.xls
-
Size
1.1MB
-
MD5
3807b929d4fdccbb0c863c2f5ebc625c
-
SHA1
90b03cf0c970b507be7239957754626cc0418122
-
SHA256
ad00bf202413a51629e0bf7e0b4d48cdf6a59004dee2cad317d1f01526c5f712
-
SHA512
b79b02643469bdd613e84bc4cc6c6caa7d3d6de980e576c7fbb55a5ae05e040bba230a74e23678516eda2b4a1680bc0d477920faaa3be1d60e72be99c6788af2
-
SSDEEP
24576:hLKwWQmmav30xH+MXU6dN+MXUw3bV++MXU23bV0OWUSngfeTw:hLKFQmmQ30t+MXH+MXL3bV++MXl3bVF+
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-