General

  • Target

    document-1462762364.xls

  • Size

    331KB

  • Sample

    201126-g7hedqa3ca

  • MD5

    057dab314009c3e022a4436424d5b56e

  • SHA1

    ea696d06a690d8b8dc992117b760aed4ff1feabd

  • SHA256

    684500f375d70aa2c092a9a0404076ca69e6fc50a3ffddfc921de809c1238c1e

  • SHA512

    f60be44557ab7c319439cfe5131f866f0d9f4c9b27bf8cd9c782b938d43f6f03aefd266feac136f651e4414cf075984aa0123a389da8b4e196eea0dbbbbc2530

Score
10/10

Malware Config

Targets

    • Target

      document-1462762364.xls

    • Size

      331KB

    • MD5

      057dab314009c3e022a4436424d5b56e

    • SHA1

      ea696d06a690d8b8dc992117b760aed4ff1feabd

    • SHA256

      684500f375d70aa2c092a9a0404076ca69e6fc50a3ffddfc921de809c1238c1e

    • SHA512

      f60be44557ab7c319439cfe5131f866f0d9f4c9b27bf8cd9c782b938d43f6f03aefd266feac136f651e4414cf075984aa0123a389da8b4e196eea0dbbbbc2530

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks