General

  • Target

    document-1521193651.xls

  • Size

    331KB

  • Sample

    201126-a1m47z4yjs

  • MD5

    9480a117fd9ec20d15c8bb2af78b9ded

  • SHA1

    bd7292a8edc56b34ade11e5dac60006b755a9523

  • SHA256

    48859bc830e61d3153eb2917802de1df80f3caad21a2da2cca4ba528fcef0f7a

  • SHA512

    3ec5a64695b5fa80599489e4f56fbf153577a658f9cc430756d35098f47dab3c98182d27abc6e42c40189bec07338926d5806c97b674575910745db6a05ea731

Score
10/10

Malware Config

Targets

    • Target

      document-1521193651.xls

    • Size

      331KB

    • MD5

      9480a117fd9ec20d15c8bb2af78b9ded

    • SHA1

      bd7292a8edc56b34ade11e5dac60006b755a9523

    • SHA256

      48859bc830e61d3153eb2917802de1df80f3caad21a2da2cca4ba528fcef0f7a

    • SHA512

      3ec5a64695b5fa80599489e4f56fbf153577a658f9cc430756d35098f47dab3c98182d27abc6e42c40189bec07338926d5806c97b674575910745db6a05ea731

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks