General

  • Target

    c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9.doc

  • Size

    189KB

  • Sample

    200717-8zj8x7k4ga

  • MD5

    95696b4e1081bd532590948eaac2ea86

  • SHA1

    dfe0f7bce39811fbc44e94de70a1230aa2891736

  • SHA256

    c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9

  • SHA512

    52f9e3b1f23ef405f11256824a712461bc75a31a8e0a9af481d548a7f5e4fadb4253ee2a8f164bfc3f28cb698a7dca706c7ea8e622758ea8d70831ff3ce6f7c2

Score
10/10

Malware Config

Targets

    • Target

      c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9.doc

    • Size

      189KB

    • MD5

      95696b4e1081bd532590948eaac2ea86

    • SHA1

      dfe0f7bce39811fbc44e94de70a1230aa2891736

    • SHA256

      c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9

    • SHA512

      52f9e3b1f23ef405f11256824a712461bc75a31a8e0a9af481d548a7f5e4fadb4253ee2a8f164bfc3f28cb698a7dca706c7ea8e622758ea8d70831ff3ce6f7c2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks