General

  • Target

    CompensationClaim-1190633265-11242020.xls

  • Size

    61KB

  • Sample

    201125-xp8a4g84rj

  • MD5

    b66c611239f82ee9b04051591ddedcc9

  • SHA1

    57d36b574cd37f069ffa513f533e31e7a12aa79b

  • SHA256

    64f8921376f7e680cf53e889b99b418b6970a491b32305ce994ef919aef64445

  • SHA512

    756cb685765abc96444d6b8f0b1891c25ba54690337066ac8d7bcd65c404ae4cf9b1bef8edc525c2da9674c8893b8a59f34faa8b7900e190541fc757b6e3dd9e

Score
10/10

Malware Config

Targets

    • Target

      CompensationClaim-1190633265-11242020.xls

    • Size

      61KB

    • MD5

      b66c611239f82ee9b04051591ddedcc9

    • SHA1

      57d36b574cd37f069ffa513f533e31e7a12aa79b

    • SHA256

      64f8921376f7e680cf53e889b99b418b6970a491b32305ce994ef919aef64445

    • SHA512

      756cb685765abc96444d6b8f0b1891c25ba54690337066ac8d7bcd65c404ae4cf9b1bef8edc525c2da9674c8893b8a59f34faa8b7900e190541fc757b6e3dd9e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks