General

  • Target

    Catalog of our new order.xlsx

  • Size

    197KB

  • Sample

    201120-5j16s8pcwx

  • MD5

    f19674cfbff25cbd3f128ffd8e78c5c4

  • SHA1

    07bf03f3b749c3d7f93758068f5a26c520279388

  • SHA256

    02781481c25663e541fd70525609f84129fb57cf044e57c3e3410972267acc30

  • SHA512

    f6dd6fd3e49fa5969ee68e45afc78033996bd0436e6e2a1ffb283dbb1f4bf64a063cce741661e8f9a8439453821ea01d30511f519b1cf722694c89a7657c5554

Score
8/10

Malware Config

Targets

    • Target

      Catalog of our new order.xlsx

    • Size

      197KB

    • MD5

      f19674cfbff25cbd3f128ffd8e78c5c4

    • SHA1

      07bf03f3b749c3d7f93758068f5a26c520279388

    • SHA256

      02781481c25663e541fd70525609f84129fb57cf044e57c3e3410972267acc30

    • SHA512

      f6dd6fd3e49fa5969ee68e45afc78033996bd0436e6e2a1ffb283dbb1f4bf64a063cce741661e8f9a8439453821ea01d30511f519b1cf722694c89a7657c5554

    Score
    8/10
    • Blacklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks