General

  • Target

    Calculation-1505646513-11202020.xls

  • Size

    61KB

  • Sample

    201125-fyk4p3x2yj

  • MD5

    0521905a4f012538c02de08a840c6cce

  • SHA1

    973a7b864f3b27abea600664263b535f3ca0182e

  • SHA256

    c91237bf50904ffb92464148483a346d579b4378400e6c72dd32b27132942cbb

  • SHA512

    dac37dc20c6c1abe568355ae4c01945258ffd80706c849b3cbb9b2d833b05efd151bd9e3cf46c4a382eae0c81c53ae5a66a1ba05e54d935cc74a85b5cd257cac

Score
10/10

Malware Config

Targets

    • Target

      Calculation-1505646513-11202020.xls

    • Size

      61KB

    • MD5

      0521905a4f012538c02de08a840c6cce

    • SHA1

      973a7b864f3b27abea600664263b535f3ca0182e

    • SHA256

      c91237bf50904ffb92464148483a346d579b4378400e6c72dd32b27132942cbb

    • SHA512

      dac37dc20c6c1abe568355ae4c01945258ffd80706c849b3cbb9b2d833b05efd151bd9e3cf46c4a382eae0c81c53ae5a66a1ba05e54d935cc74a85b5cd257cac

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks