General

  • Target

    document-1496831930.xls

  • Size

    331KB

  • Sample

    201126-nybw2crmp6

  • MD5

    7b67ef658abdd27562f707a687abe6a5

  • SHA1

    5ecf5c64f9ee1b4a0db0e69a0b4c655d84fa74ad

  • SHA256

    bb853d9410a75278ae40e2e177f4ae00ae986b8a0f51641e192b5e8dda40961e

  • SHA512

    4b5332321eaab9c66132abc221b759343fb0f9e2d71120cc0a333ca4031dfe8f054c3a100ad4f7a052859fbec63b8e0140e933d3577fd079a564f345251c951e

Score
10/10

Malware Config

Targets

    • Target

      document-1496831930.xls

    • Size

      331KB

    • MD5

      7b67ef658abdd27562f707a687abe6a5

    • SHA1

      5ecf5c64f9ee1b4a0db0e69a0b4c655d84fa74ad

    • SHA256

      bb853d9410a75278ae40e2e177f4ae00ae986b8a0f51641e192b5e8dda40961e

    • SHA512

      4b5332321eaab9c66132abc221b759343fb0f9e2d71120cc0a333ca4031dfe8f054c3a100ad4f7a052859fbec63b8e0140e933d3577fd079a564f345251c951e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks