General

  • Target

    document-1543772758.xls

  • Size

    331KB

  • Sample

    201126-6pas65t3e2

  • MD5

    b3c08c0f3bc95a84618feed7b2308b68

  • SHA1

    7eb1f6fa6862605afcb49b3d0685df06a980dffe

  • SHA256

    f37cdb7579a8b57ff8517959cad4641246121401874ff139a45bbeed5beeba74

  • SHA512

    b578038f103302690a14faa5500f1ac2018f34bae9cdf4dbc0320dcac26c077788a9b6c8dcc23ce37662b565dc2a258f308ee4c59aa47dfd87b58eeb145f6003

Score
10/10

Malware Config

Targets

    • Target

      document-1543772758.xls

    • Size

      331KB

    • MD5

      b3c08c0f3bc95a84618feed7b2308b68

    • SHA1

      7eb1f6fa6862605afcb49b3d0685df06a980dffe

    • SHA256

      f37cdb7579a8b57ff8517959cad4641246121401874ff139a45bbeed5beeba74

    • SHA512

      b578038f103302690a14faa5500f1ac2018f34bae9cdf4dbc0320dcac26c077788a9b6c8dcc23ce37662b565dc2a258f308ee4c59aa47dfd87b58eeb145f6003

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks