General

  • Target

    d1527dc6635a8acb6290a3ff38640bb8b29d8d7e8cb44707389607fce521f472.doc

  • Size

    188KB

  • Sample

    200717-j127em4wse

  • MD5

    48bf4d5720ec1c7a21c046f651e73a89

  • SHA1

    248b0e3db72754a98f6ef33569b6becbbf107a06

  • SHA256

    d1527dc6635a8acb6290a3ff38640bb8b29d8d7e8cb44707389607fce521f472

  • SHA512

    b78defa8d5da870c30456f9dfe5440975122fe3805a6c2499c2423c2b7d68c03c656bcd1abce2cb37caa0367fc974392ac962d227ad40f9fcb0c73c8b44c3279

Score
10/10

Malware Config

Targets

    • Target

      d1527dc6635a8acb6290a3ff38640bb8b29d8d7e8cb44707389607fce521f472.doc

    • Size

      188KB

    • MD5

      48bf4d5720ec1c7a21c046f651e73a89

    • SHA1

      248b0e3db72754a98f6ef33569b6becbbf107a06

    • SHA256

      d1527dc6635a8acb6290a3ff38640bb8b29d8d7e8cb44707389607fce521f472

    • SHA512

      b78defa8d5da870c30456f9dfe5440975122fe3805a6c2499c2423c2b7d68c03c656bcd1abce2cb37caa0367fc974392ac962d227ad40f9fcb0c73c8b44c3279

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks