General

  • Target

    doc 254.xls

  • Size

    148KB

  • Sample

    200708-dakd8wrv9s

  • MD5

    1da39c74a95b990cdaac9bc18a27c0d0

  • SHA1

    48b1d4e9479babc1fc8e97d55f32d524c2ff3161

  • SHA256

    26b0659a6b1fae9be0eb3ae6eef0e6c9288f45db16b94ffeeecb75aa8e4aa9b7

  • SHA512

    064d3030937be4e87d109e384401ef84710a6588a88d60d1869d499532cb6f3448b4f52933774d0580a5ca2c666e96d0596caa8592c79996f24feca343d07084

Score
10/10

Malware Config

Targets

    • Target

      doc 254.xls

    • Size

      148KB

    • MD5

      1da39c74a95b990cdaac9bc18a27c0d0

    • SHA1

      48b1d4e9479babc1fc8e97d55f32d524c2ff3161

    • SHA256

      26b0659a6b1fae9be0eb3ae6eef0e6c9288f45db16b94ffeeecb75aa8e4aa9b7

    • SHA512

      064d3030937be4e87d109e384401ef84710a6588a88d60d1869d499532cb6f3448b4f52933774d0580a5ca2c666e96d0596caa8592c79996f24feca343d07084

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks