General
-
Target
8e586a928eecac9fa5b4dd6980915389f0092c6ec968ffe90dc4ccf3504ae578.xlsm
-
Size
48KB
-
Sample
220314-y191labhh9
-
MD5
1655267f2eef17c7bea81ee6cf65fbf9
-
SHA1
dd062a715bd8eee2b8b4d30e6786e5b108b63c1a
-
SHA256
8e586a928eecac9fa5b4dd6980915389f0092c6ec968ffe90dc4ccf3504ae578
-
SHA512
3b0f05743a81756ef75e8da15e393f40365c71d7e986141bfb467acd8a232581cc5bd01953ed61b6129652ebd9517b1282f01fbbe2e808aa70dc3c906bbb726d
Behavioral task
behavioral1
Sample
8e586a928eecac9fa5b4dd6980915389f0092c6ec968ffe90dc4ccf3504ae578.xlsm
Resource
win10-20220310-en
Behavioral task
behavioral2
Sample
8e586a928eecac9fa5b4dd6980915389f0092c6ec968ffe90dc4ccf3504ae578.xlsm
Resource
win10-20220310-en
Malware Config
Extracted
http://www.arkpp.com/ARIS-BSU/9K1/
http://www.avrworks.com/mail/0Z4GbaKuDTGprJ/
http://www.babylinesl.com/catalog/iVsl6YvlyIyX/
https://physioacademy.co.uk/blog/Qs8QZTp0Z6nKf9YjVBMS/
https://unada.us/acme-challenge/3NXwcYNCa/
https://automobile-facile.fr/wp-admin/QV/
https://alebit.de/css/gqKtdKmTsC4iDh/
Extracted
http://www.arkpp.com/ARIS-BSU/9K1/
Targets
-
-
Target
8e586a928eecac9fa5b4dd6980915389f0092c6ec968ffe90dc4ccf3504ae578.xlsm
-
Size
48KB
-
MD5
1655267f2eef17c7bea81ee6cf65fbf9
-
SHA1
dd062a715bd8eee2b8b4d30e6786e5b108b63c1a
-
SHA256
8e586a928eecac9fa5b4dd6980915389f0092c6ec968ffe90dc4ccf3504ae578
-
SHA512
3b0f05743a81756ef75e8da15e393f40365c71d7e986141bfb467acd8a232581cc5bd01953ed61b6129652ebd9517b1282f01fbbe2e808aa70dc3c906bbb726d
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation