General

  • Target

    INV-PA00720082024002S.xla.xlsx

  • Size

    481KB

  • Sample

    240821-hytb3avhmg

  • MD5

    08fb9822dc63acff13a2faec811cd744

  • SHA1

    11a886d6ba2fbb73e55831763e26fbc5b695b4f6

  • SHA256

    9270474814491efc7c0f4ef6f1200c68c1908ad27c31e5316370acf78e97fc09

  • SHA512

    e8eef909bbda34c1dac3739234646402e8a3e5928565218237be9bff398b5c12cbf281c00f71f642ae3f7bd8e0e23fdda6bcc6c504c270187494a642f60759b7

  • SSDEEP

    6144:QlTBpRTFwSgypddGx+kFdE+wt2zC2w/Y3CMw4jrE9v7ly1xmBqhfQmkAEdvWSsD2:YXG9sBMC2unTU6welZsDNSlwbeVWg

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg

exe.dropper

https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg

Targets

    • Target

      INV-PA00720082024002S.xla.xlsx

    • Size

      481KB

    • MD5

      08fb9822dc63acff13a2faec811cd744

    • SHA1

      11a886d6ba2fbb73e55831763e26fbc5b695b4f6

    • SHA256

      9270474814491efc7c0f4ef6f1200c68c1908ad27c31e5316370acf78e97fc09

    • SHA512

      e8eef909bbda34c1dac3739234646402e8a3e5928565218237be9bff398b5c12cbf281c00f71f642ae3f7bd8e0e23fdda6bcc6c504c270187494a642f60759b7

    • SSDEEP

      6144:QlTBpRTFwSgypddGx+kFdE+wt2zC2w/Y3CMw4jrE9v7ly1xmBqhfQmkAEdvWSsD2:YXG9sBMC2unTU6welZsDNSlwbeVWg

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Abuses OpenXML format to download file from external location

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks