General

  • Target

    4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146.doc

  • Size

    189KB

  • Sample

    200717-p7w47c31n6

  • MD5

    8bf215ddf97dbb3635ecb087c99232b7

  • SHA1

    7abc4f8c0a5d3aa88daec11feb3f8b4febb85099

  • SHA256

    4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146

  • SHA512

    60afec4843c3f92076798f87cae0f19941fd92d2bfc272d36fa7f003e6685dabaf772c8dc71837af50be6a3d3c61407e3f263036cb2d52a6d0ac57871d49dab9

Score
10/10

Malware Config

Targets

    • Target

      4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146.doc

    • Size

      189KB

    • MD5

      8bf215ddf97dbb3635ecb087c99232b7

    • SHA1

      7abc4f8c0a5d3aa88daec11feb3f8b4febb85099

    • SHA256

      4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146

    • SHA512

      60afec4843c3f92076798f87cae0f19941fd92d2bfc272d36fa7f003e6685dabaf772c8dc71837af50be6a3d3c61407e3f263036cb2d52a6d0ac57871d49dab9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks