General

  • Target

    document-1444627885.xls

  • Size

    331KB

  • Sample

    201126-h3yb5jmzn2

  • MD5

    0e6f8a0858acef150b19ec975069f715

  • SHA1

    2457549a5263cb95bffefe7943f530662f1210df

  • SHA256

    e51bd6641358cb292afb7735ccd852e53362676690c265ae98041049271a6e16

  • SHA512

    438345e4e46288984cc555fce07450639333a36805f13e52b8773df55057785ea17ef709c5c477f1896fde33a64ab18048be3722baf2cfb566d106b8af999116

Score
10/10

Malware Config

Targets

    • Target

      document-1444627885.xls

    • Size

      331KB

    • MD5

      0e6f8a0858acef150b19ec975069f715

    • SHA1

      2457549a5263cb95bffefe7943f530662f1210df

    • SHA256

      e51bd6641358cb292afb7735ccd852e53362676690c265ae98041049271a6e16

    • SHA512

      438345e4e46288984cc555fce07450639333a36805f13e52b8773df55057785ea17ef709c5c477f1896fde33a64ab18048be3722baf2cfb566d106b8af999116

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks