General

  • Target

    document-1448493973.xls

  • Size

    332KB

  • Sample

    201126-gc3vx68k9e

  • MD5

    76db28482575f98e2efd61fb2fa1a268

  • SHA1

    601baeb484b148a9c3511860943b3b78d7529f40

  • SHA256

    4f601e6e0db46afef419a299c5c026332a129ed6aa516df7ddf948b8122ddd7e

  • SHA512

    41bbad28c4ec4f0604d4c1998ad0c24bff62ab634627a60ac7ad908d18d389c65a4c5b30d37c0c6260ca14d1491d2dbcd4b2d4bf017f3ba058d3feca927dd502

Score
10/10

Malware Config

Targets

    • Target

      document-1448493973.xls

    • Size

      332KB

    • MD5

      76db28482575f98e2efd61fb2fa1a268

    • SHA1

      601baeb484b148a9c3511860943b3b78d7529f40

    • SHA256

      4f601e6e0db46afef419a299c5c026332a129ed6aa516df7ddf948b8122ddd7e

    • SHA512

      41bbad28c4ec4f0604d4c1998ad0c24bff62ab634627a60ac7ad908d18d389c65a4c5b30d37c0c6260ca14d1491d2dbcd4b2d4bf017f3ba058d3feca927dd502

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks