General

  • Target

    document-1474357336.xls

  • Size

    331KB

  • Sample

    201126-1b6fdd3cma

  • MD5

    52e95774051c14cb5ef8d45eb053702f

  • SHA1

    b64f7d3c78d1c481e7490370f2357c3db8dc2347

  • SHA256

    2b95fb85503af2c94caa283c10207ff4e53891afebe5c44449a27165d49f4af1

  • SHA512

    41aea6a89b8e414526e5406895ca975950670aaee880fe225c9c800a93eae43f9ac94ec4c90f3ffb360d0c6e5da58c60e5d51529eca223ebc9605c89a51914ed

Score
10/10

Malware Config

Targets

    • Target

      document-1474357336.xls

    • Size

      331KB

    • MD5

      52e95774051c14cb5ef8d45eb053702f

    • SHA1

      b64f7d3c78d1c481e7490370f2357c3db8dc2347

    • SHA256

      2b95fb85503af2c94caa283c10207ff4e53891afebe5c44449a27165d49f4af1

    • SHA512

      41aea6a89b8e414526e5406895ca975950670aaee880fe225c9c800a93eae43f9ac94ec4c90f3ffb360d0c6e5da58c60e5d51529eca223ebc9605c89a51914ed

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks