General

  • Target

    document-1499387068.xls

  • Size

    331KB

  • Sample

    201126-h4wklawq92

  • MD5

    4709fc2bbfb3057281797be43e3f7779

  • SHA1

    7417518fe120351d0c2c4bc6930800f014962691

  • SHA256

    b1b09a823c27c2df2a6c42d531fae05d6e2053df997b6e4e64551a4db5081504

  • SHA512

    871d3d743d70aeb067faa62014be7cd775a8605208d9c3f841f4664c2a22ae0c66849a85856cdddcabddf1f0ff581bb9f73b53df9c71b0257bed65619456ee36

Score
10/10

Malware Config

Targets

    • Target

      document-1499387068.xls

    • Size

      331KB

    • MD5

      4709fc2bbfb3057281797be43e3f7779

    • SHA1

      7417518fe120351d0c2c4bc6930800f014962691

    • SHA256

      b1b09a823c27c2df2a6c42d531fae05d6e2053df997b6e4e64551a4db5081504

    • SHA512

      871d3d743d70aeb067faa62014be7cd775a8605208d9c3f841f4664c2a22ae0c66849a85856cdddcabddf1f0ff581bb9f73b53df9c71b0257bed65619456ee36

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks