General

  • Target

    CompensationClaim-249761403-11242020.xls

  • Size

    61KB

  • Sample

    201125-r967d96cp6

  • MD5

    045899b89ef185eea3baa0a2fdf6a1a2

  • SHA1

    f29675396c705da72fef9eb452f1777ca07a36dc

  • SHA256

    c0b83b92765df26c382fed68564097c14fbaf4d4b05647fb2c80a9ca39107ef1

  • SHA512

    206761a06582d00f9912acfc375226c4d34bf98aa1cd9aaa6f49f5fa1be39320c1e803d30e5a5c4a893726e22e01463afb59a83227671aeb699de2db4888fc12

Score
10/10

Malware Config

Targets

    • Target

      CompensationClaim-249761403-11242020.xls

    • Size

      61KB

    • MD5

      045899b89ef185eea3baa0a2fdf6a1a2

    • SHA1

      f29675396c705da72fef9eb452f1777ca07a36dc

    • SHA256

      c0b83b92765df26c382fed68564097c14fbaf4d4b05647fb2c80a9ca39107ef1

    • SHA512

      206761a06582d00f9912acfc375226c4d34bf98aa1cd9aaa6f49f5fa1be39320c1e803d30e5a5c4a893726e22e01463afb59a83227671aeb699de2db4888fc12

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks