General

  • Target

    document-1363274030.xls

  • Size

    331KB

  • Sample

    201126-jxn5cq1w52

  • MD5

    29f9a9e791bdba63fdd7ab5d5e503b6e

  • SHA1

    8c9da50c5595cc975aaa2cb13e5f87245ae0482c

  • SHA256

    c8005a1323b5905057c7637b4bb81610b6f0ff01f5f4539d2daf27e4c65e2f3c

  • SHA512

    24bdf23f80a86dc68214d58b236f095485bc0964871c6cb2a9ce61c27c3ac51d1f557511548b58ef84ae95822a3ee499348d67010d7d80ed7401cdec7d570587

Score
10/10

Malware Config

Targets

    • Target

      document-1363274030.xls

    • Size

      331KB

    • MD5

      29f9a9e791bdba63fdd7ab5d5e503b6e

    • SHA1

      8c9da50c5595cc975aaa2cb13e5f87245ae0482c

    • SHA256

      c8005a1323b5905057c7637b4bb81610b6f0ff01f5f4539d2daf27e4c65e2f3c

    • SHA512

      24bdf23f80a86dc68214d58b236f095485bc0964871c6cb2a9ce61c27c3ac51d1f557511548b58ef84ae95822a3ee499348d67010d7d80ed7401cdec7d570587

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks