General

  • Target

    document-1475836582.xls

  • Size

    331KB

  • Sample

    201126-byl129l4pe

  • MD5

    2809566c96036e628145200cd09dbb1d

  • SHA1

    d91282d5a121673c8f805a65abbf77089c8c22e3

  • SHA256

    27d277398d0b048c456b784c337e359e998be95d02de675e6290eeadfd57a0d8

  • SHA512

    62b98619959cdb485b49dd75779ffbc71b0fcdc87a7480dd0393ece67d4dab97cd51e8426e4f6d10bf0e2cbfcb803fb93ed86e55ec82ab82340500937d198f1a

Score
10/10

Malware Config

Targets

    • Target

      document-1475836582.xls

    • Size

      331KB

    • MD5

      2809566c96036e628145200cd09dbb1d

    • SHA1

      d91282d5a121673c8f805a65abbf77089c8c22e3

    • SHA256

      27d277398d0b048c456b784c337e359e998be95d02de675e6290eeadfd57a0d8

    • SHA512

      62b98619959cdb485b49dd75779ffbc71b0fcdc87a7480dd0393ece67d4dab97cd51e8426e4f6d10bf0e2cbfcb803fb93ed86e55ec82ab82340500937d198f1a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks