General

  • Target

    824524892.xlsm

  • Size

    83KB

  • Sample

    220112-xdgj4adfel

  • MD5

    3a34a8f95b92bec1e9aefb1235d27dfd

  • SHA1

    5aa96c293a519112b6453657c103add288a84cdf

  • SHA256

    cce90115dbb29f91192ea44a98616dbd6b6f4a74e76c8eefe004edba731635b7

  • SHA512

    dcaaac4a8cbcb8c2472bf015c3da35a3864424f809453fe3340e94e88d9ddeeb2a94321b4edf1ca07637b9ea593546a7b0d66626a588df4ace084afc1ce4fc48

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.be-pu.com/4.hana/Y1XWpb1zWMRD/

xlm40.dropper

https://josephinebaba.com/licenses/7Doxdg/

xlm40.dropper

http://bestwifirouterreview.xyz/wp-includes/css/uyC/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.be-pu.com/4.hana/Y1XWpb1zWMRD/

Targets

    • Target

      824524892.xlsm

    • Size

      83KB

    • MD5

      3a34a8f95b92bec1e9aefb1235d27dfd

    • SHA1

      5aa96c293a519112b6453657c103add288a84cdf

    • SHA256

      cce90115dbb29f91192ea44a98616dbd6b6f4a74e76c8eefe004edba731635b7

    • SHA512

      dcaaac4a8cbcb8c2472bf015c3da35a3864424f809453fe3340e94e88d9ddeeb2a94321b4edf1ca07637b9ea593546a7b0d66626a588df4ace084afc1ce4fc48

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks