General

  • Target

    document-1500762737.xls

  • Size

    331KB

  • Sample

    201126-cacw1nsw22

  • MD5

    e04df3b6e832dc90ff10989f04adb096

  • SHA1

    f64e23eac3842d419ea12e0e0ac53b395a5ca6de

  • SHA256

    3dd8b248fcc28084d24d63a125dda3d0d3b1588aeaf50caca35142d6facdde1d

  • SHA512

    baebceb6f4eb266e8486de634a0df6d726886dc11db9d23f2db539d1c093f436cf250427866d14fd23db0a669c8d8d9bced25f905e7a2fa41d0993265b7f2afa

Score
10/10

Malware Config

Targets

    • Target

      document-1500762737.xls

    • Size

      331KB

    • MD5

      e04df3b6e832dc90ff10989f04adb096

    • SHA1

      f64e23eac3842d419ea12e0e0ac53b395a5ca6de

    • SHA256

      3dd8b248fcc28084d24d63a125dda3d0d3b1588aeaf50caca35142d6facdde1d

    • SHA512

      baebceb6f4eb266e8486de634a0df6d726886dc11db9d23f2db539d1c093f436cf250427866d14fd23db0a669c8d8d9bced25f905e7a2fa41d0993265b7f2afa

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks