General
-
Target
a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d
-
Size
44KB
-
Sample
240710-12b63asfpn
-
MD5
80c41171c577be1d459280fbfc32dcd3
-
SHA1
547365af1c26196a9790f1822fe47b48a736d1fd
-
SHA256
a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d
-
SHA512
0f3ca85952e083f11765e0230c840cef2db1c008c8a4f63a199f875c2b5dddc4ba929d24f056370d98cff5c3d3da872d3eb8cef71745c3c5b7391e052994fee0
-
SSDEEP
768:qtvo+6lzak3hbdlylKsgqopeJBWhZFGkE+cL2NdAJM57WauFlmQQT0TJ9acA9ac6:C5k3hbdlylKsgqopeJBWhZFGkE+cL2NW
Behavioral task
behavioral1
Sample
a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d.xls
Resource
win10v2004-20240709-en
Malware Config
Extracted
https://raw.githubusercontent.com/enigma0x3/Generate-Macro/master/Generate-Macro.ps1
Targets
-
-
Target
a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d
-
Size
44KB
-
MD5
80c41171c577be1d459280fbfc32dcd3
-
SHA1
547365af1c26196a9790f1822fe47b48a736d1fd
-
SHA256
a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d
-
SHA512
0f3ca85952e083f11765e0230c840cef2db1c008c8a4f63a199f875c2b5dddc4ba929d24f056370d98cff5c3d3da872d3eb8cef71745c3c5b7391e052994fee0
-
SSDEEP
768:qtvo+6lzak3hbdlylKsgqopeJBWhZFGkE+cL2NdAJM57WauFlmQQT0TJ9acA9ac6:C5k3hbdlylKsgqopeJBWhZFGkE+cL2NW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-