General

  • Target

    document-1467223313.xls

  • Size

    332KB

  • Sample

    201126-7ekdz49j7n

  • MD5

    2d4792ef0821e6a36b7e1fa7b108112b

  • SHA1

    22d87d822e34d12a7e5208239f0b8c2ef44f4375

  • SHA256

    98fd8492a74ea86f78aed060cb3814b157fdb9e316358767980d743d383dc53e

  • SHA512

    baa1d78eaa3e9cf1061afa7ac48885eb72b6a09c14293ba357c8eb8e886050e4579ec69664c41a5637d6edd890702728d8315aceeb4e7942100bc59fdd550877

Score
10/10

Malware Config

Targets

    • Target

      document-1467223313.xls

    • Size

      332KB

    • MD5

      2d4792ef0821e6a36b7e1fa7b108112b

    • SHA1

      22d87d822e34d12a7e5208239f0b8c2ef44f4375

    • SHA256

      98fd8492a74ea86f78aed060cb3814b157fdb9e316358767980d743d383dc53e

    • SHA512

      baa1d78eaa3e9cf1061afa7ac48885eb72b6a09c14293ba357c8eb8e886050e4579ec69664c41a5637d6edd890702728d8315aceeb4e7942100bc59fdd550877

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks