General

  • Target

    document-1560478486.xls

  • Size

    331KB

  • Sample

    201126-9yhzbkxvej

  • MD5

    2f7482a21d8fc46444b3005c37272f82

  • SHA1

    0be63d58da277283049e6b8f75ece89595653a78

  • SHA256

    d1b297e51e20f6671e0079a0c043a320d52941748987ad68da071439154121a6

  • SHA512

    e2c7d539207db4ad9c5758bbd0a650919ebfbed51c1d73cc92ef91e466b2751e1d7dd18040f91df0f5f703cde36591bff36fd89f2a60720f63de6445f956871d

Score
10/10

Malware Config

Targets

    • Target

      document-1560478486.xls

    • Size

      331KB

    • MD5

      2f7482a21d8fc46444b3005c37272f82

    • SHA1

      0be63d58da277283049e6b8f75ece89595653a78

    • SHA256

      d1b297e51e20f6671e0079a0c043a320d52941748987ad68da071439154121a6

    • SHA512

      e2c7d539207db4ad9c5758bbd0a650919ebfbed51c1d73cc92ef91e466b2751e1d7dd18040f91df0f5f703cde36591bff36fd89f2a60720f63de6445f956871d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks