General

  • Target

    document-1519955618.xls

  • Size

    331KB

  • Sample

    201126-6a6phzezs2

  • MD5

    cc41800ef9d9b03153b1435c237cc531

  • SHA1

    b6608de5bba778b008492e3011ebc4edeecce49a

  • SHA256

    cef498c623c6a1bcf8f3f5e987364358cb4f58e83fe1f44c0de7ea86deed7855

  • SHA512

    668fea36df614c57c90769236b17e0ac9865e2e5336fc1504d7bb1c4249758b6cf3a16df46e730258bcc52774e859eaced68b23ae56069aa475be5beffc46da1

Score
10/10

Malware Config

Targets

    • Target

      document-1519955618.xls

    • Size

      331KB

    • MD5

      cc41800ef9d9b03153b1435c237cc531

    • SHA1

      b6608de5bba778b008492e3011ebc4edeecce49a

    • SHA256

      cef498c623c6a1bcf8f3f5e987364358cb4f58e83fe1f44c0de7ea86deed7855

    • SHA512

      668fea36df614c57c90769236b17e0ac9865e2e5336fc1504d7bb1c4249758b6cf3a16df46e730258bcc52774e859eaced68b23ae56069aa475be5beffc46da1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks