General

  • Target

    document-1470686903.xls

  • Size

    331KB

  • Sample

    201126-2rvc4aaj2x

  • MD5

    e34a5d2fa92390698ee5aacef3f189cc

  • SHA1

    d0a114f90332d6fe901a4e5a43c9fd6aaca42160

  • SHA256

    993f9393140180772815355ee4d3d5f4d6e3a305d58510b9678ea4249d74ef84

  • SHA512

    846be1e3e1ff77f45946f399d32860d12740c0115d9004102e47fb44e22259c8a790d5ff2ad3fad4d8207fe0aef57e77d223f72a4764ecf6d2137509de54ace8

Score
10/10

Malware Config

Targets

    • Target

      document-1470686903.xls

    • Size

      331KB

    • MD5

      e34a5d2fa92390698ee5aacef3f189cc

    • SHA1

      d0a114f90332d6fe901a4e5a43c9fd6aaca42160

    • SHA256

      993f9393140180772815355ee4d3d5f4d6e3a305d58510b9678ea4249d74ef84

    • SHA512

      846be1e3e1ff77f45946f399d32860d12740c0115d9004102e47fb44e22259c8a790d5ff2ad3fad4d8207fe0aef57e77d223f72a4764ecf6d2137509de54ace8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks