General

  • Target

    4_5782639054168262929.docx

  • Size

    95KB

  • Sample

    200711-78m2q6me4x

  • MD5

    e51e433a767ef0598c96765c57fd2a58

  • SHA1

    a26b73801943eb12d3cb103306c10b47fe66e432

  • SHA256

    c5918c1c684c5dd20f039fb3442638a98d4e139936336d64b2accdeed7558390

  • SHA512

    44443ea971ae5765ea3ae32517e6eba4c370ad0b50cdde5a7dffb28861c6abbb46b3909b051341972df70fce0a42b66c1d9d1a6f3d53bc8d1d64cc26fcdacb5f

Score
10/10

Malware Config

Targets

    • Target

      4_5782639054168262929.docx

    • Size

      95KB

    • MD5

      e51e433a767ef0598c96765c57fd2a58

    • SHA1

      a26b73801943eb12d3cb103306c10b47fe66e432

    • SHA256

      c5918c1c684c5dd20f039fb3442638a98d4e139936336d64b2accdeed7558390

    • SHA512

      44443ea971ae5765ea3ae32517e6eba4c370ad0b50cdde5a7dffb28861c6abbb46b3909b051341972df70fce0a42b66c1d9d1a6f3d53bc8d1d64cc26fcdacb5f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Abuses OpenXML format to download file from external location

    • Modifies system certificate store

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks