General

  • Target

    document-1466544307.xls

  • Size

    332KB

  • Sample

    201126-a442jmrghx

  • MD5

    27b3f22bd7bfe78bf161293d38a9afd8

  • SHA1

    c9f5ec26545125aed2aeae4d50959cf14e5ea619

  • SHA256

    c003e77aa45b48731bd6e563327f3c9e123bed120d896c301121091211d05e38

  • SHA512

    cbbd168f3e76d07f9d98412adfcf03854b322a13b51aa229db29012454af8bf93c9946a6872e38e3859b7d02e262518d0b44ca5779d21fe6fbbe30b77a3fc599

Score
10/10

Malware Config

Targets

    • Target

      document-1466544307.xls

    • Size

      332KB

    • MD5

      27b3f22bd7bfe78bf161293d38a9afd8

    • SHA1

      c9f5ec26545125aed2aeae4d50959cf14e5ea619

    • SHA256

      c003e77aa45b48731bd6e563327f3c9e123bed120d896c301121091211d05e38

    • SHA512

      cbbd168f3e76d07f9d98412adfcf03854b322a13b51aa229db29012454af8bf93c9946a6872e38e3859b7d02e262518d0b44ca5779d21fe6fbbe30b77a3fc599

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks