General

  • Target

    document-1568041171.xls

  • Size

    331KB

  • Sample

    201126-lv2qfvwr1j

  • MD5

    a47b2d454fdcdc2c168c68dd7a047708

  • SHA1

    a6f115281f69765b961d49d0be3c54de70878852

  • SHA256

    3293cef156ef2002870e8a3f32f191382f8f5a5df7e19ca58dd1093dfd0103d5

  • SHA512

    3b2c270478b96a5a0888e7bb9f191f615ebfcbcf903aecd63afc727b1a94c2356e4cfd22976665ae669f1820e4d43745c1dcdaccf41bbbcd6c5f60530e4e951e

Score
10/10

Malware Config

Targets

    • Target

      document-1568041171.xls

    • Size

      331KB

    • MD5

      a47b2d454fdcdc2c168c68dd7a047708

    • SHA1

      a6f115281f69765b961d49d0be3c54de70878852

    • SHA256

      3293cef156ef2002870e8a3f32f191382f8f5a5df7e19ca58dd1093dfd0103d5

    • SHA512

      3b2c270478b96a5a0888e7bb9f191f615ebfcbcf903aecd63afc727b1a94c2356e4cfd22976665ae669f1820e4d43745c1dcdaccf41bbbcd6c5f60530e4e951e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks