General

  • Target

    statistica 07.08.2020.doc

  • Size

    133KB

  • Sample

    200711-pwt6evp92j

  • MD5

    424ca9eba9300706fec87e0705d5e53c

  • SHA1

    0bed3bd81d21445d7d2efa65a9aa3149decfcfed

  • SHA256

    c9f867afbf23760e2dcf9582ec762c18ba458e98b1ac5efc8f69d6785d45d932

  • SHA512

    bd40ce16cbfc37d36a25b24150dce7f4e070b2931afabddaea7b17944cbcbdeffd44732805963cb7bd0ab14c4b026dad98e8de670238aa59d052e364277f9502

Score
10/10

Malware Config

Targets

    • Target

      statistica 07.08.2020.doc

    • Size

      133KB

    • MD5

      424ca9eba9300706fec87e0705d5e53c

    • SHA1

      0bed3bd81d21445d7d2efa65a9aa3149decfcfed

    • SHA256

      c9f867afbf23760e2dcf9582ec762c18ba458e98b1ac5efc8f69d6785d45d932

    • SHA512

      bd40ce16cbfc37d36a25b24150dce7f4e070b2931afabddaea7b17944cbcbdeffd44732805963cb7bd0ab14c4b026dad98e8de670238aa59d052e364277f9502

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks