General
-
Target
PaidInvoicePdf.exe
-
Size
696KB
-
Sample
250203-l15dwsxqaw
-
MD5
800ffdb94a4c823184385509daf24178
-
SHA1
42269e47c7bd0e0e71ebcddeffa9e8f7fd87dc69
-
SHA256
27ffa4783191b2211f9f11043cdfb2df12898202cbef969013082c7634b2f27b
-
SHA512
dc11235024197202e9a00059ca5660e09537ac7a6411fc6098ce34f5715b95254a52147231e41e74ae141ee74b8bf9fe3c7b497c8b99ee0697a1f38037fa5c4d
-
SSDEEP
12288:PYGjdswecl94lQ40JfOofko3QSkQREOyMh344m/xDX/ch:2wedlWOofqSkwKcIrPch
Static task
static1
Behavioral task
behavioral1
Sample
PaidInvoicePdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
n7ak
wise-transfer.info
jam-nins.com
thebestsocialcrm.com
majomeow222.com
ancientshadowguilt.space
gentleman-china.com
parquemermoz.store
taxuw.com
sharqiyapaints.com
libraryofkath.com
1949wan.com
synqr.net
bitchessgirls.com
btonu.cfd
coding-bootcamps-16314.com
leadership22-tdh.site
maximsboutique.com
irishsummertruffles.com
sdnaqianchuan.com
uyews.xyz
mostvisitors.com
prembug.com
lebondtrip.com
villavouno.com
solanosotostudio.com
pbx1.website
littleeturtle.com
supremeajock.biz
turborings.run
parkpeninsula.online
goodstuff.tv
17qld.com
thehandycrewcompany.com
alwaystuesdaytacos.com
entribeworks.com
susanboyleinfo.com
volkovastyu.com
tradingmoja.com
germancompany-eg.com
gameofgem.com
hbdpcq.com
budsdesigns.com
sistemrizal.xyz
395boulderbrookdr.com
forounlock.com
cp2967.com
creatividadymedia.com
marocquadchallenge.com
tuktukwines.com
tripskorea.com
eyvonnesewingshop.com
1690.biz
perfectkick.website
jreengineering.tech
lilmeow.store
ttjsdispatchingllc.com
carltonellis.com
redantholdings.com
luxuryworkingfarms.com
appsecintelligence.com
studmate.online
imogenbot.store
netheerlandart.com
bikelegalkentucky.com
playdoapp.online
Targets
-
-
Target
PaidInvoicePdf.exe
-
Size
696KB
-
MD5
800ffdb94a4c823184385509daf24178
-
SHA1
42269e47c7bd0e0e71ebcddeffa9e8f7fd87dc69
-
SHA256
27ffa4783191b2211f9f11043cdfb2df12898202cbef969013082c7634b2f27b
-
SHA512
dc11235024197202e9a00059ca5660e09537ac7a6411fc6098ce34f5715b95254a52147231e41e74ae141ee74b8bf9fe3c7b497c8b99ee0697a1f38037fa5c4d
-
SSDEEP
12288:PYGjdswecl94lQ40JfOofko3QSkQREOyMh344m/xDX/ch:2wedlWOofqSkwKcIrPch
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1