General

  • Target

    prochollow.doc

  • Size

    143KB

  • Sample

    200317-pt9rcrh1l2

  • MD5

    b107f3235057bb2b06283030be8f26e4

  • SHA1

    b12d2984830eee5ef668032cc13691706efce4a5

  • SHA256

    5d077b1341a6472f02aac89488976d4395a91ae4f23657b0344da74f4a560c8d

  • SHA512

    b7cb31da8be04e044b3c8aadaf00555277fe990cbc42a81d718812b849be153ba6a87227d37374a6ea3cc3de2a204a749e9b643d8a7c1f39a29aa7beb913b3b8

Score
10/10

Malware Config

Targets

    • Target

      prochollow.doc

    • Size

      143KB

    • MD5

      b107f3235057bb2b06283030be8f26e4

    • SHA1

      b12d2984830eee5ef668032cc13691706efce4a5

    • SHA256

      5d077b1341a6472f02aac89488976d4395a91ae4f23657b0344da74f4a560c8d

    • SHA512

      b7cb31da8be04e044b3c8aadaf00555277fe990cbc42a81d718812b849be153ba6a87227d37374a6ea3cc3de2a204a749e9b643d8a7c1f39a29aa7beb913b3b8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks