General
-
Target
PO-014842-2.xls
-
Size
555KB
-
Sample
240829-gj64yaydkn
-
MD5
0eca5068b23513d7d20d9f05b5a33cde
-
SHA1
b11da160460403bacb257d4832ca617fcf8c9840
-
SHA256
b171b5e7c7abd247edcc25f1c00301e89f1e9715ed6d98f03f4b6a6674c5834b
-
SHA512
2b16f2c208573a9361b646e34b6ac627fb3d9b80fb0ff7a09cf3d0e5bfeefb2d09ad482e428a5effe80a3da1267df4c07f08728f589ea6b01324ef6adb102d16
-
SSDEEP
12288:++M2PYL9XdP7MqOZzCSbxuKuw+9WompCHYCFxi7Ehh7wYf:+cPYLpdwZdMK3ewCHTqo0Y
Static task
static1
Behavioral task
behavioral1
Sample
PO-014842-2.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
PO-014842-2.xls
Resource
win10v2004-20240802-en
Malware Config
Extracted
formbook
4.1
b48n
anifestmindset.net
ommybahamabigsales.shop
3tcxr.xyz
iano-world.net
rconf23.net
atherpa.shop
trllrpartners.club
5sawit777.pro
ctbhuxcdreioijresol.top
opinatlas.app
pinstar.xyz
mfengwa.top
8games13.xyz
tickpaket.online
iphuodongallbbtbtm.top
ental-bridges-51593.bond
laywithkemon.rest
lkpiou.xyz
a88.land
igfloppafan.club
12k5t7i2j.sbs
lubfitgrowth.xyz
uro-news.live
espets1.buzz
uccessfuldatingtips.info
sed-cars-93620.bond
epatitis-treatment-25621.bond
ocakges.click
yai54.top
estbuy-purchase.online
itesmiledl.net
power.services
olar-systems-panels-31076.bond
5571.club
ffg7.autos
reespins.claims
arriage-therapy-60427.bond
3am.sbs
tk-m.online
atami-suzuki.net
op-smartphone-deals.today
acik.rest
srsvrfive.xyz
6561.xyz
ajubasah1.buzz
t83t56zshegbbo.sbs
dma.xyz
xrduxsd220.xyz
leaningcompanies-near-me.today
aregiverjobs-2507-ns.click
reensick.online
rmunx.shop
ewllife.net
tp3-pick4d.shop
ianju-ljef097.vip
oxshop1.online
wuogi.top
46rr211sm.autos
saac-xaaab.buzz
zaohh.online
ontosdabiblia.online
ackson-xaaab.buzz
v5t7.xyz
udo-flix.pro
5ldym2.shop
Targets
-
-
Target
PO-014842-2.xls
-
Size
555KB
-
MD5
0eca5068b23513d7d20d9f05b5a33cde
-
SHA1
b11da160460403bacb257d4832ca617fcf8c9840
-
SHA256
b171b5e7c7abd247edcc25f1c00301e89f1e9715ed6d98f03f4b6a6674c5834b
-
SHA512
2b16f2c208573a9361b646e34b6ac627fb3d9b80fb0ff7a09cf3d0e5bfeefb2d09ad482e428a5effe80a3da1267df4c07f08728f589ea6b01324ef6adb102d16
-
SSDEEP
12288:++M2PYL9XdP7MqOZzCSbxuKuw+9WompCHYCFxi7Ehh7wYf:+cPYLpdwZdMK3ewCHTqo0Y
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Evasion via Device Credential Deployment
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-