General
-
Target
document.xlsm
-
Size
53KB
-
Sample
210820-a8tymxf36j
-
MD5
50097dcbf3f4071e621ebbf3911d6ed5
-
SHA1
eef3fad484c512b778a25d931edba6726d39f5f3
-
SHA256
adf1d9e22efc7d95a57aa8754fe5e489380c52de240167930f7043d079e34144
-
SHA512
6067d055751c17e701ccca54c87af094bf8c8434728978f296887da3592f2021275cf5cff5b4f9c3c67bb427fa46cce228a2d89e863cf2cc561adf47720135c9
Static task
static1
Behavioral task
behavioral1
Sample
document.xlsm
Resource
win7v20210408
Malware Config
Extracted
rustybuer
https://awmelisers.com/
Targets
-
-
Target
document.xlsm
-
Size
53KB
-
MD5
50097dcbf3f4071e621ebbf3911d6ed5
-
SHA1
eef3fad484c512b778a25d931edba6726d39f5f3
-
SHA256
adf1d9e22efc7d95a57aa8754fe5e489380c52de240167930f7043d079e34144
-
SHA512
6067d055751c17e701ccca54c87af094bf8c8434728978f296887da3592f2021275cf5cff5b4f9c3c67bb427fa46cce228a2d89e863cf2cc561adf47720135c9
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-