General
-
Target
fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036.xls
-
Size
869KB
-
Sample
241023-cfsd6awcrb
-
MD5
22100d6799cce6677b27c5adedc37555
-
SHA1
ab6e115fb8de52dce34a26b384780c730bb1c0bf
-
SHA256
fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036
-
SHA512
a78943a97ca87c20a0da4380da617ca3248399fc9b00a101886f08972696606309fa8962cc3b66ff7dd8daefb2ba20572fa5401b7764e4ee7fc25d87d7bffdcb
-
SSDEEP
12288:1lBjmzHJE+CzldDD3DERnLRmF8DaJhuBU3LLQDC7SGooNnlix9I:TByczlVbARM8uoU3nQ4xiH
Static task
static1
Behavioral task
behavioral1
Sample
fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036.xls
-
Size
869KB
-
MD5
22100d6799cce6677b27c5adedc37555
-
SHA1
ab6e115fb8de52dce34a26b384780c730bb1c0bf
-
SHA256
fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036
-
SHA512
a78943a97ca87c20a0da4380da617ca3248399fc9b00a101886f08972696606309fa8962cc3b66ff7dd8daefb2ba20572fa5401b7764e4ee7fc25d87d7bffdcb
-
SSDEEP
12288:1lBjmzHJE+CzldDD3DERnLRmF8DaJhuBU3LLQDC7SGooNnlix9I:TByczlVbARM8uoU3nQ4xiH
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-