General
-
Target
QTE000021674.doc
-
Size
432KB
-
Sample
240528-saffeahe7y
-
MD5
520c787857586063238e4684770f9f51
-
SHA1
bcc10a912754c22eccfc20f8840dd83bbbc40770
-
SHA256
d5f9868247128595477ac9fb6a5af781853986c05adf9d111b10b59e7fbe962e
-
SHA512
32bbf81e48a8c71876a9b1ded27245d45ade4ce563b80a168149e1499fd6cb260ab717e304b81b2beb1d056df215713d65feb47094e93fa94707525489cf4d8c
-
SSDEEP
6144:4wAYwAYwAYwAYwAYwAYwAYwAYwAYwABKeeIeqW:6
Static task
static1
Behavioral task
behavioral1
Sample
QTE000021674.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
QTE000021674.rtf
Resource
win10v2004-20240426-en
Malware Config
Extracted
formbook
4.1
mw62
abpdainik.in
luxuryprojectmalad.co.in
cajunbellebeauty.com
fpmfstudios.com
spedyz.shop
wilddogphotographics.com
apollomoda1.com
evrimciftciportfolio.com
99977bet.com
inefavel.com
mf85.com
online-doctor-nl-1.bond
zqi2lv.vip
thewebdesignhub.co
botwitter.com
18comic-palwoeld.club
loveweldpermanentjewelry.com
l3er39pc-gaywn6kv-d7fs4t7u.cc
31yoyogamestudio.com
yhvh.cloud
skechersoutlets-nz.com
elroyaldearagon.com
adamandcoco.com
xembonghay1.com
glasspanelrepair.com
epl317.top
lindacoledesign.com
brainfog.cloud
hermandaddelrociodecoria.store
capmozwork.com
hewqam.xyz
sullivanbusinessconsulting.com
justicefortrump2024.com
nhakhoasing.xyz
eldozz-draw.top
dasoak.top
estun.shop
2658jjj.buzz
replay77situs.co
therainbowpeoplejp.com
onartgo.com
imanse-impact-consultancy.com
feedsone.top
danielreinhold.com
tinytap.online
bactedes.website
xn--80akkrcheecblg.online
useliteacademy.com
growfrsh.cfd
texas.cyou
etca7575.online
samo-ai.com
baseresidents.xyz
nextmove.homes
larosacontracting.com
208001.com
hbkzle.shop
melbet-pakistan.com
remagrholod.store
airlinetickets.click
achievedisabilityservices.com
yourethevoicemusical.com
1aqx3s3y.shop
od93p9g5xwbk.xyz
dfrt.store
Targets
-
-
Target
QTE000021674.doc
-
Size
432KB
-
MD5
520c787857586063238e4684770f9f51
-
SHA1
bcc10a912754c22eccfc20f8840dd83bbbc40770
-
SHA256
d5f9868247128595477ac9fb6a5af781853986c05adf9d111b10b59e7fbe962e
-
SHA512
32bbf81e48a8c71876a9b1ded27245d45ade4ce563b80a168149e1499fd6cb260ab717e304b81b2beb1d056df215713d65feb47094e93fa94707525489cf4d8c
-
SSDEEP
6144:4wAYwAYwAYwAYwAYwAYwAYwAYwAYwABKeeIeqW:6
-
Formbook payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-