General

  • Target

    Calculation-1421113288-11202020.xls

  • Size

    61KB

  • Sample

    201125-12fqrm72tj

  • MD5

    026e352321bacf5fb2cc6eb4002b26ae

  • SHA1

    a27c9d892aeccb3759fbf71d21404befabbdd431

  • SHA256

    3a8ac2f64fd8b15e4f88db0c54add4fd61e5c17dd5515ada898006169e2f99f2

  • SHA512

    c488011641eeea64e4aa2458631b85ff7a855b89f34153f3f827d249d3022ac198d2a2a295bc210693777acd58349a77c0fe5483e9cd167d7de637c2c8dfd8fc

Score
10/10

Malware Config

Targets

    • Target

      Calculation-1421113288-11202020.xls

    • Size

      61KB

    • MD5

      026e352321bacf5fb2cc6eb4002b26ae

    • SHA1

      a27c9d892aeccb3759fbf71d21404befabbdd431

    • SHA256

      3a8ac2f64fd8b15e4f88db0c54add4fd61e5c17dd5515ada898006169e2f99f2

    • SHA512

      c488011641eeea64e4aa2458631b85ff7a855b89f34153f3f827d249d3022ac198d2a2a295bc210693777acd58349a77c0fe5483e9cd167d7de637c2c8dfd8fc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks