General

  • Target

    Fattura_25785.xlsm

  • Size

    28KB

  • Sample

    201124-yxw8znrnfe

  • MD5

    f72f88ebdf048fdfedf0aa3e298d9e71

  • SHA1

    b8ea58415338bed65d4cd194ead6ac663ad71a6c

  • SHA256

    78ccf25ecee02f759cefa6b1c29a00fb4ce64c000f7b9c04c1fc08e04d04bc1b

  • SHA512

    0c6d96fcda11df417cfd48d51753d5a6334d80df04b3709ccbfc8a2d5d073822ad606da49e99c724a9d5bd16a98a623f2f9f3a2cbfe2b01bc668f44991db2903

Score
10/10

Malware Config

Targets

    • Target

      Fattura_25785.xlsm

    • Size

      28KB

    • MD5

      f72f88ebdf048fdfedf0aa3e298d9e71

    • SHA1

      b8ea58415338bed65d4cd194ead6ac663ad71a6c

    • SHA256

      78ccf25ecee02f759cefa6b1c29a00fb4ce64c000f7b9c04c1fc08e04d04bc1b

    • SHA512

      0c6d96fcda11df417cfd48d51753d5a6334d80df04b3709ccbfc8a2d5d073822ad606da49e99c724a9d5bd16a98a623f2f9f3a2cbfe2b01bc668f44991db2903

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks