General
-
Target
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls
-
Size
1.0MB
-
Sample
241026-c3qtvawkbn
-
MD5
e7b0128fdc780e228be72adbed8765c4
-
SHA1
4a7456b2d6422c33f8f7aafa302cd43c8d2d5033
-
SHA256
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786
-
SHA512
da2da848812a40e02e547f6c047baa345492839ac322965721c1988ba862ae3535edb1f9928359db9d64df4eacfd0bcf4e412eaa762cb88e712f2d8b5a56f5b8
-
SSDEEP
12288:nmzHJEyfN1Y1uBPj39wZE8D3DERnLRmF8D6IHf8wh9HN8zFykCGrqD:uhfg14318bARM8FH/hX85yhz
Static task
static1
Behavioral task
behavioral1
Sample
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls
-
Size
1.0MB
-
MD5
e7b0128fdc780e228be72adbed8765c4
-
SHA1
4a7456b2d6422c33f8f7aafa302cd43c8d2d5033
-
SHA256
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786
-
SHA512
da2da848812a40e02e547f6c047baa345492839ac322965721c1988ba862ae3535edb1f9928359db9d64df4eacfd0bcf4e412eaa762cb88e712f2d8b5a56f5b8
-
SSDEEP
12288:nmzHJEyfN1Y1uBPj39wZE8D3DERnLRmF8D6IHf8wh9HN8zFykCGrqD:uhfg14318bARM8FH/hX85yhz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-