General
-
Target
SOAPO8829921199.xlsm
-
Size
165KB
-
Sample
240904-rz7qhsscjn
-
MD5
c0a096ce5928bce34fffd5874093f235
-
SHA1
971a8fbd841e42dcab84288205525b89301825c2
-
SHA256
54929de588e37191bfc6dd0bf4f3edc1fca58c67af0e6bc7b1bd15a66d8c1bf0
-
SHA512
9d7c5aaf2fe546422ff3379169909929ec50f6eebba27d527178066c943ea2973a72c7501202b9502c8ccd646dfe6b49c1194c34b8f9822404bf1fad6971eb61
-
SSDEEP
3072:BJNjJehd8PiRjkctohQQRBK0BvyixmZ49ke+jJLNkYa6+Rc64d:BJN06iactuRbB6M9+1GYaza64d
Behavioral task
behavioral1
Sample
SOAPO8829921199.xlsm
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
t20u
ecurity-jobs-ne-00989.bond
ameuniverse.shop
sychologist-therapy-33393.bond
refabricated-homes-33099.bond
urltheswirl.live
reengroce.online
cknowledgewizardinter14.sbs
excasino.club
931.bet
ilehog.net
olorandbrush.net
jpbbmr.biz
vtwenty20pt.top
nline-advertising-76521.bond
eavenresidence.net
arodyna.shop
orsi-di-massaggio.bond
est-kids-toys-near-me.today
47-nurse-76671.bond
u-suppr.top
onstruction-jobs-49170.bond
yewxop.xyz
ruisjob.today
nlinecourses92.today
91599.club
oluoav.xyz
ashiono.shop
panish-classes-65082.bond
uikfox.buzz
adoggeriacamadepiedra.online
nvestment-services-64552.bond
8s6wj.digital
exy-baccarat66.net
itchenremodelingideas.online
risis-tech.net
enior-dating-24515.bond
epatitis-treatment-85780.bond
etrition.shop
iautomationmarket.net
nfluencer-marketing-41712.bond
eststock.website
amphunt.online
enddid.shop
rogramddd.shop
5g2q9.buzz
aconstructionjob.bond
asedzos.fun
aktikkvtoto04.info
entley-paaae.buzz
d36d.shop
tatikkdb.app
eedsunited.live
fzf.xxx
hrcbmggvm.top
-web-apple02.buzz
ibotech.net
ackrelaxer.shop
ggdonor-bd-en-fb-va.today
400725ieulrju709.top
ind-one-bedroom-apartment.today
addiehub.zone
hairulaming.asia
eirobox.online
ofs2is5ap.buzz
twow.shop
Targets
-
-
Target
SOAPO8829921199.xlsm
-
Size
165KB
-
MD5
c0a096ce5928bce34fffd5874093f235
-
SHA1
971a8fbd841e42dcab84288205525b89301825c2
-
SHA256
54929de588e37191bfc6dd0bf4f3edc1fca58c67af0e6bc7b1bd15a66d8c1bf0
-
SHA512
9d7c5aaf2fe546422ff3379169909929ec50f6eebba27d527178066c943ea2973a72c7501202b9502c8ccd646dfe6b49c1194c34b8f9822404bf1fad6971eb61
-
SSDEEP
3072:BJNjJehd8PiRjkctohQQRBK0BvyixmZ49ke+jJLNkYa6+Rc64d:BJN06iactuRbB6M9+1GYaza64d
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-