General

  • Target

    document-1446250854.xls

  • Size

    331KB

  • Sample

    201126-9e3pnlg7vs

  • MD5

    cb8eb8cc0fe5e1764dd912828736ca1c

  • SHA1

    c2a6d86faed5ba7d3985a9e1cb55aa5488a847ec

  • SHA256

    33248dd53583ef06e919ac86d85407c9133e6738244b2197a1b401a8f66bdbf1

  • SHA512

    64ae6177dde3fe5fca1b289fb26922649df70d35e7d76e5271e6329dcedfd87399e54898dcc8ffdf9bc3644989676098d36a05cee480dc6b7165e611a1f744d8

Score
10/10

Malware Config

Targets

    • Target

      document-1446250854.xls

    • Size

      331KB

    • MD5

      cb8eb8cc0fe5e1764dd912828736ca1c

    • SHA1

      c2a6d86faed5ba7d3985a9e1cb55aa5488a847ec

    • SHA256

      33248dd53583ef06e919ac86d85407c9133e6738244b2197a1b401a8f66bdbf1

    • SHA512

      64ae6177dde3fe5fca1b289fb26922649df70d35e7d76e5271e6329dcedfd87399e54898dcc8ffdf9bc3644989676098d36a05cee480dc6b7165e611a1f744d8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks