General

  • Target

    document-1489938345.xls

  • Size

    331KB

  • Sample

    201126-29v2451wce

  • MD5

    5283897fed08a928dadb6e509bbf21a1

  • SHA1

    b0743f25d36f1c8295480c582df93b93f763cb5a

  • SHA256

    1674d157b7aea8c22ab3e5b5f2781d3fbb43388ce4ca90465f023b01420e7185

  • SHA512

    51ba4d1b7217bc9aea390d1a72e3edb7204516fafe3ef7f65cecf8d4497a405c0124e331adf42241f97578c966d68591aaa31434997268825bc793866f6c1bf8

Score
10/10

Malware Config

Targets

    • Target

      document-1489938345.xls

    • Size

      331KB

    • MD5

      5283897fed08a928dadb6e509bbf21a1

    • SHA1

      b0743f25d36f1c8295480c582df93b93f763cb5a

    • SHA256

      1674d157b7aea8c22ab3e5b5f2781d3fbb43388ce4ca90465f023b01420e7185

    • SHA512

      51ba4d1b7217bc9aea390d1a72e3edb7204516fafe3ef7f65cecf8d4497a405c0124e331adf42241f97578c966d68591aaa31434997268825bc793866f6c1bf8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks