General

  • Target

    test.zip

  • Size

    7.3MB

  • Sample

    191113-8zmc4ve6a2

  • MD5

    d67d29dfc872a069a1f6fe7eec57becb

  • SHA1

    e47cf8238cfb8aa1012e5de1e44d46b23d867f97

  • SHA256

    72b228f51cf5a1b7600f0e0848145e4e54e54838977a5a5b1c85f69b64b92cf5

  • SHA512

    8302ebb02d97800dc6495101129930606a65096556b1d004b94d757a31d0c8935edca87d072d8c0059c055203bead0a2d59a0cf7150f6f954b0be0bfc9849dc7

Malware Config

Targets

    • Target

      0dded430c1958ae0ec60c2d50ab99f562269ad1ee09db17606661bd55cd29c66.doc

    • Size

      81KB

    • MD5

      fac7b441a730abf96b210a8db9dbf3d1

    • SHA1

      9f5bb869b95136f51b954e4284f99168ff0e91fb

    • SHA256

      0dded430c1958ae0ec60c2d50ab99f562269ad1ee09db17606661bd55cd29c66

    • SHA512

      0a5ec69ec554639ede43c359f38f8d2e52718b7e29a06aa112ff8cdc99b2777a39c3a9455d3796033a813cceda7487104fb8f0027eccfa138bcd0c2064606f07

    • Process spawned unexpected child process

    • Drops Office document

    • Windows cmd obfuscated command

MITRE ATT&CK Matrix ATT&CK v6

Execution

PowerShell

1
T1086

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

4
T1012

System Information Discovery

3
T1082

Tasks