General

  • Target

    document-1460277780.xls

  • Size

    331KB

  • Sample

    201126-9x5ecr5sq2

  • MD5

    8daf15bc79db4badf16cb6877da759af

  • SHA1

    433b4aef1f346912d7243c708a6453371cee5dbe

  • SHA256

    ee19fb53c556fbd204d6828e579fe519bf7419bb3d917aadc25291f86f74e573

  • SHA512

    803378b05b41dc55f8dce1e7e5bd231665f135eabdaf708d33f8c813b7fb47d87bc313aac23a7dad531093abae8c23bc3e18ebaed3a55e29e3771cd11be10d98

Score
10/10

Malware Config

Targets

    • Target

      document-1460277780.xls

    • Size

      331KB

    • MD5

      8daf15bc79db4badf16cb6877da759af

    • SHA1

      433b4aef1f346912d7243c708a6453371cee5dbe

    • SHA256

      ee19fb53c556fbd204d6828e579fe519bf7419bb3d917aadc25291f86f74e573

    • SHA512

      803378b05b41dc55f8dce1e7e5bd231665f135eabdaf708d33f8c813b7fb47d87bc313aac23a7dad531093abae8c23bc3e18ebaed3a55e29e3771cd11be10d98

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks