General
-
Target
PROFORMA INVOICE.xls
-
Size
706KB
-
Sample
240923-rbjnsayaml
-
MD5
a387e1b3ddfebd3a54d76332e03c7429
-
SHA1
84e7c4c1c9ea719e03a9ad35b17552ef52f0939e
-
SHA256
fb5a6a5965acca3363cbd1157c564584f2b85f41c6ec10a659e05cb559800202
-
SHA512
ef088fb7ed0d6e47cd88d267b4c2bed52be5c046984c1e47a3abb598266ee1b5787133dae27bd66ef401fcdda7515de682be99e948d3bd236481a74e697c0a37
-
SSDEEP
12288:m+UOAsHFnd7HeT/o8gg8Rsfe8Lyi6PlCJ6lKR+PFPSm/YBxyxdDEyawqkLP:mepsAbg8RGetCJR+P1SbiEzK
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PROFORMA INVOICE.xls
Resource
win10v2004-20240802-en
Malware Config
Extracted
formbook
4.1
j62t
qualegacy.shop
ijngblv.top
hop-tiktok.top
nti-aging-66026.bond
ostashqiptare-al.info
faretireltd.info
dra.finance
arden-office-45382.bond
nair.today
dence.tokyo
omoantifragilis.net
eet-new-people-26331.bond
ocfamilyto.llc
roduct-tester-jobs-68513.bond
elestialaurelia.buzz
uzzbuilders.buzz
ryptofaucet.xyz
krfq.shop
jbhu.vip
uemw.top
uke-paaae.buzz
q6z7.xyz
athing-suits-48943.bond
leaning-products-36759.bond
hatcode.app
earner.group
xistwithinthecontext.xyz
vu91.online
entalimplantsusasale.today
leveneleven.international
alenttotravel.net
airlosstreatment11.shop
mirror.live
ps.directory
rooki.shop
llslotbet.online
earme.lol
3d5doizqy.lol
onstruction-services-86411.bond
vip-company-app.website
tprhy88-ang.lol
oeziad.net
oudeserv.shop
atecards.net
xperiscore.online
ocutoraprofesional.net
zdq-f4pm.net
eal-estate-in-dubai-f.pro
dadi.sbs
upportwantbunssod.pics
njurylawyer119822.online
yhbvc.xyz
oofing-services-19582.bond
dtools.net
lood-glucose-monitor-11002.bond
winvip13.fun
ome-care-37159.bond
usicalevents.xyz
262tdcmhx.bond
01527.xyz
rthodontist-2507-vcf-sup.click
igitalgroup.cfd
enddid.shop
liviamartinez.net
agacity.press
Targets
-
-
Target
PROFORMA INVOICE.xls
-
Size
706KB
-
MD5
a387e1b3ddfebd3a54d76332e03c7429
-
SHA1
84e7c4c1c9ea719e03a9ad35b17552ef52f0939e
-
SHA256
fb5a6a5965acca3363cbd1157c564584f2b85f41c6ec10a659e05cb559800202
-
SHA512
ef088fb7ed0d6e47cd88d267b4c2bed52be5c046984c1e47a3abb598266ee1b5787133dae27bd66ef401fcdda7515de682be99e948d3bd236481a74e697c0a37
-
SSDEEP
12288:m+UOAsHFnd7HeT/o8gg8Rsfe8Lyi6PlCJ6lKR+PFPSm/YBxyxdDEyawqkLP:mepsAbg8RGetCJR+P1SbiEzK
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Evasion via Device Credential Deployment
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-