General

  • Target

    46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99.doc

  • Size

    188KB

  • Sample

    200717-r8mawxtc9e

  • MD5

    d4a1b3cb3c3382875666f25a1050d2b3

  • SHA1

    a86cc878084f4b651c82bb4c89b3b97381c53775

  • SHA256

    46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99

  • SHA512

    6d54d63dd8531940817f947421391672892310718ac4a727465e00a8532cea3717cb5132bac47df20161b9f8c6c70163e35267fdf80aafafe92440eadc778f43

Score
10/10

Malware Config

Targets

    • Target

      46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99.doc

    • Size

      188KB

    • MD5

      d4a1b3cb3c3382875666f25a1050d2b3

    • SHA1

      a86cc878084f4b651c82bb4c89b3b97381c53775

    • SHA256

      46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99

    • SHA512

      6d54d63dd8531940817f947421391672892310718ac4a727465e00a8532cea3717cb5132bac47df20161b9f8c6c70163e35267fdf80aafafe92440eadc778f43

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks