General

  • Target

    dettagli-07.08.2020.doc

  • Size

    147KB

  • Sample

    200711-dd779cxn46

  • MD5

    3b7a15f5094bbab789626ba83d70ec1f

  • SHA1

    1c562038115775343ae7f8159410401381bf1cd3

  • SHA256

    1009aea4a8bbbd5395bfec97a0cf88c62577c68a98d32c161ffc97cbd869e7cb

  • SHA512

    e0e59328605009abb0004a80958741aca108338c594d3187552aa71641b38380a5e3b5b2c72058941e3ac98896779129289b154f72369875d83569fb3e2162eb

Score
10/10

Malware Config

Targets

    • Target

      dettagli-07.08.2020.doc

    • Size

      147KB

    • MD5

      3b7a15f5094bbab789626ba83d70ec1f

    • SHA1

      1c562038115775343ae7f8159410401381bf1cd3

    • SHA256

      1009aea4a8bbbd5395bfec97a0cf88c62577c68a98d32c161ffc97cbd869e7cb

    • SHA512

      e0e59328605009abb0004a80958741aca108338c594d3187552aa71641b38380a5e3b5b2c72058941e3ac98896779129289b154f72369875d83569fb3e2162eb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks