General

  • Target

    document-1541567989.xls

  • Size

    331KB

  • Sample

    201126-14qez4p7as

  • MD5

    0463cb4fd1e555a186f5b3a8af341f09

  • SHA1

    17480d19b34034da23caeb769dfedd3c20a0c98f

  • SHA256

    2b8503acb44ac658605d6478039c3361e7cc74874b925c86c0c7a5e5e16d2974

  • SHA512

    dfb247c618e1ceb5d8124ba20127999582388be840c5335c2a53b6f875076c7af86a7ad0a8115e4aa956e48fa7380b741c4a762056b79b28363972a767edc2a3

Score
10/10

Malware Config

Targets

    • Target

      document-1541567989.xls

    • Size

      331KB

    • MD5

      0463cb4fd1e555a186f5b3a8af341f09

    • SHA1

      17480d19b34034da23caeb769dfedd3c20a0c98f

    • SHA256

      2b8503acb44ac658605d6478039c3361e7cc74874b925c86c0c7a5e5e16d2974

    • SHA512

      dfb247c618e1ceb5d8124ba20127999582388be840c5335c2a53b6f875076c7af86a7ad0a8115e4aa956e48fa7380b741c4a762056b79b28363972a767edc2a3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks