General

  • Target

    document-1482447343.xls

  • Size

    331KB

  • Sample

    201126-4fs9ps3l9e

  • MD5

    b3ff0b1bb4a56e8abcc748dea10a05e9

  • SHA1

    c5c97501ccbeae486089680f33a255f2d679d51c

  • SHA256

    3f98a0954ec0afe5ac98d97444874736df1a40e29877a60876aee8f3c9e53a04

  • SHA512

    3ace7bb2bb524907cfe461205f6f45d30541c5ff0872d81c5337d2f9be2f5270b76daa8724544612e78e8b19fbe9c6ce9050b6f84821bc25728bf1221b4de0b5

Score
10/10

Malware Config

Targets

    • Target

      document-1482447343.xls

    • Size

      331KB

    • MD5

      b3ff0b1bb4a56e8abcc748dea10a05e9

    • SHA1

      c5c97501ccbeae486089680f33a255f2d679d51c

    • SHA256

      3f98a0954ec0afe5ac98d97444874736df1a40e29877a60876aee8f3c9e53a04

    • SHA512

      3ace7bb2bb524907cfe461205f6f45d30541c5ff0872d81c5337d2f9be2f5270b76daa8724544612e78e8b19fbe9c6ce9050b6f84821bc25728bf1221b4de0b5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks