General

  • Target

    certificato-07.08.2020.doc

  • Size

    147KB

  • Sample

    200710-7vjepxdqye

  • MD5

    e6524bfe307ac0e25cbefd32e562f7b5

  • SHA1

    c82af405405cc21144e12c943a36ee785393c1b8

  • SHA256

    859ee5d6161bb723f736f9ce868a3ab5a4cd5b4c07296239d0fcc49d7cdd8249

  • SHA512

    31f0858a420c126e1011197ac54b847d2ba84845cf91ef7f0965271f4ddd78004674722d68ad3a34b3a398ffd4d4bbb52761140d473a622a83d5e69664d6506b

Score
10/10

Malware Config

Targets

    • Target

      certificato-07.08.2020.doc

    • Size

      147KB

    • MD5

      e6524bfe307ac0e25cbefd32e562f7b5

    • SHA1

      c82af405405cc21144e12c943a36ee785393c1b8

    • SHA256

      859ee5d6161bb723f736f9ce868a3ab5a4cd5b4c07296239d0fcc49d7cdd8249

    • SHA512

      31f0858a420c126e1011197ac54b847d2ba84845cf91ef7f0965271f4ddd78004674722d68ad3a34b3a398ffd4d4bbb52761140d473a622a83d5e69664d6506b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Modifies WinLogon to allow AutoLogon

      Enables rebooting of the machine without requiring login credentials.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks