General
-
Target
Shipping Documents WMLREF115900.xls
-
Size
98KB
-
Sample
241024-lx4yysxakn
-
MD5
98502d8342f1afd8b699b26ff777a919
-
SHA1
0d0c6a6f90611fee9c232d90fca0776dbbff5241
-
SHA256
40bcfababa169393524d58a9447ea465ac7a18edd09ae9eaea2739c8d77dab9d
-
SHA512
0d1e03166c7dc08098acaeace97930fdc7bfa5b50932bbb6ee151691202389f1d7d053c2d0b0a6248ecfa7a6056bd16a0ad2a61e91a6f03d292d7ace1d5e7e86
-
SSDEEP
1536:MiqHy1S6F8b2SQrEkawpoXIow7yLHXXRD6G10u9QvuTUpx2MjeHmfDI7:UeFHrE2sIoeK3XR2GWumv6UprT
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents WMLREF115900.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipping Documents WMLREF115900.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
Shipping Documents WMLREF115900.xls
-
Size
98KB
-
MD5
98502d8342f1afd8b699b26ff777a919
-
SHA1
0d0c6a6f90611fee9c232d90fca0776dbbff5241
-
SHA256
40bcfababa169393524d58a9447ea465ac7a18edd09ae9eaea2739c8d77dab9d
-
SHA512
0d1e03166c7dc08098acaeace97930fdc7bfa5b50932bbb6ee151691202389f1d7d053c2d0b0a6248ecfa7a6056bd16a0ad2a61e91a6f03d292d7ace1d5e7e86
-
SSDEEP
1536:MiqHy1S6F8b2SQrEkawpoXIow7yLHXXRD6G10u9QvuTUpx2MjeHmfDI7:UeFHrE2sIoeK3XR2GWumv6UprT
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-