General

  • Target

    document-1563857457.xls

  • Size

    331KB

  • Sample

    201126-kwe51qttdx

  • MD5

    5b6bed84c2f2b015c60536cbcfeb5566

  • SHA1

    9e572cff2e46c9806ee7edf81a55492f17ba8b20

  • SHA256

    61be1094f5f130e37f22bd305644a80ebaf9aed146010e91f4d6e0eda4fa7e05

  • SHA512

    f30bdcfd774bb5c9ba8f703b17ed87842ff15b1a09035858b0bf7cb33921545aa23917116fc767e8b2d650f5795a952d2cc740eb538078efde658bb22c2f838b

Score
10/10

Malware Config

Targets

    • Target

      document-1563857457.xls

    • Size

      331KB

    • MD5

      5b6bed84c2f2b015c60536cbcfeb5566

    • SHA1

      9e572cff2e46c9806ee7edf81a55492f17ba8b20

    • SHA256

      61be1094f5f130e37f22bd305644a80ebaf9aed146010e91f4d6e0eda4fa7e05

    • SHA512

      f30bdcfd774bb5c9ba8f703b17ed87842ff15b1a09035858b0bf7cb33921545aa23917116fc767e8b2d650f5795a952d2cc740eb538078efde658bb22c2f838b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks