General

  • Target

    document-14531360.xls

  • Size

    332KB

  • Sample

    201126-gwbj2g3bpn

  • MD5

    b0ae942cfd6a6f0074df22cc7131886c

  • SHA1

    ab15473160e561ccf8678db2d79b6c4bae0b47f7

  • SHA256

    14ae5eea32e9d34b85df57d77d5dd091e06e4d141ebe649f89c526c2f6b973bd

  • SHA512

    cf8e0bb721244450a8e1722e00d237ff2f69be359eee5552d21a6c420fc500c4779ea4a357e0411d8e8ac2f755b7c0331cf9bb0c4c29f9071c587b7c822d6c93

Score
10/10

Malware Config

Targets

    • Target

      document-14531360.xls

    • Size

      332KB

    • MD5

      b0ae942cfd6a6f0074df22cc7131886c

    • SHA1

      ab15473160e561ccf8678db2d79b6c4bae0b47f7

    • SHA256

      14ae5eea32e9d34b85df57d77d5dd091e06e4d141ebe649f89c526c2f6b973bd

    • SHA512

      cf8e0bb721244450a8e1722e00d237ff2f69be359eee5552d21a6c420fc500c4779ea4a357e0411d8e8ac2f755b7c0331cf9bb0c4c29f9071c587b7c822d6c93

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks