General

  • Target

    document-1449953935.xls

  • Size

    331KB

  • Sample

    201126-6cfpwvmjyn

  • MD5

    d094d59cc53395b2bde1b79d59045dae

  • SHA1

    a98aa224a291e81d31f70508b8420182ed7e6ee0

  • SHA256

    4f0b2fc9e36a57d083793960b96ec631ada63ed0d992072ba3ee13681842aa39

  • SHA512

    069265decd8bde2c1cd74873fbc9096cc3d25d7c5b4704bdf968d28db9b3780be7ca9c1406cec4bac4b8a05c4bf8b4e48ded66a587498dd156e5d28c61051366

Score
10/10

Malware Config

Targets

    • Target

      document-1449953935.xls

    • Size

      331KB

    • MD5

      d094d59cc53395b2bde1b79d59045dae

    • SHA1

      a98aa224a291e81d31f70508b8420182ed7e6ee0

    • SHA256

      4f0b2fc9e36a57d083793960b96ec631ada63ed0d992072ba3ee13681842aa39

    • SHA512

      069265decd8bde2c1cd74873fbc9096cc3d25d7c5b4704bdf968d28db9b3780be7ca9c1406cec4bac4b8a05c4bf8b4e48ded66a587498dd156e5d28c61051366

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks