General

  • Target

    document-1451937055.xls

  • Size

    331KB

  • Sample

    201126-gch6h3z1la

  • MD5

    63a90ecfe507d27197fbc3f22d9ed416

  • SHA1

    8b337386021a5b5f3afc74dd0d489ccb4e8f39f1

  • SHA256

    766fe56a77ebab18d8978bc58020e739331b8e9641f9e1983906568b775aa07d

  • SHA512

    fb38cf76df36f49a1084871c83470e09213b2e88f1fa8f3a2eebdb7cda19321acbe13887a6acc7ab113f96476f7b7821afbdc4e3f6a7f72c1d8bbdd091583eea

Score
10/10

Malware Config

Targets

    • Target

      document-1451937055.xls

    • Size

      331KB

    • MD5

      63a90ecfe507d27197fbc3f22d9ed416

    • SHA1

      8b337386021a5b5f3afc74dd0d489ccb4e8f39f1

    • SHA256

      766fe56a77ebab18d8978bc58020e739331b8e9641f9e1983906568b775aa07d

    • SHA512

      fb38cf76df36f49a1084871c83470e09213b2e88f1fa8f3a2eebdb7cda19321acbe13887a6acc7ab113f96476f7b7821afbdc4e3f6a7f72c1d8bbdd091583eea

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks