General

  • Target

    doc.789.xls

  • Size

    143KB

  • Sample

    200707-hl9z5n4tpe

  • MD5

    ed1d2c8d4986bff5a0fb1d4e0992ff33

  • SHA1

    a63f84b1049b338816d4a1d5c8479ff9c05364f3

  • SHA256

    d141bc335e621dca9cd1e3340be2987f8d6b057fe384450c4b1059c1cc98ab0d

  • SHA512

    40e7856982c9603658a1cab7a30e0e15f3474029a263df76bdf96247dbfa61860fbfc6851f4fa8b842a4e6ed21fc6f0cc50a21f876f4a810d6b3ebd97daf5bbd

Score
10/10

Malware Config

Targets

    • Target

      doc.789.xls

    • Size

      143KB

    • MD5

      ed1d2c8d4986bff5a0fb1d4e0992ff33

    • SHA1

      a63f84b1049b338816d4a1d5c8479ff9c05364f3

    • SHA256

      d141bc335e621dca9cd1e3340be2987f8d6b057fe384450c4b1059c1cc98ab0d

    • SHA512

      40e7856982c9603658a1cab7a30e0e15f3474029a263df76bdf96247dbfa61860fbfc6851f4fa8b842a4e6ed21fc6f0cc50a21f876f4a810d6b3ebd97daf5bbd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks