General

  • Target

    document-1490602303.xls

  • Size

    331KB

  • Sample

    201126-pnvpgjk9h2

  • MD5

    4744f6ae98c81678d7b920ef630fb8e1

  • SHA1

    448c028934bf1ec877e213892a81cab7bca46522

  • SHA256

    afc214cad3aa00d0e0661e706683b15b1b8642cf963e9a66c32fd9cf62aeebc1

  • SHA512

    401d8b757d85298d10914b3bce6560742936bd7c287c49be9fbfb2b8a389aa7b738d9480b52ca3040a4ceb79894d31869df86f12f08f28c345a503f6f0b3cac3

Score
10/10

Malware Config

Targets

    • Target

      document-1490602303.xls

    • Size

      331KB

    • MD5

      4744f6ae98c81678d7b920ef630fb8e1

    • SHA1

      448c028934bf1ec877e213892a81cab7bca46522

    • SHA256

      afc214cad3aa00d0e0661e706683b15b1b8642cf963e9a66c32fd9cf62aeebc1

    • SHA512

      401d8b757d85298d10914b3bce6560742936bd7c287c49be9fbfb2b8a389aa7b738d9480b52ca3040a4ceb79894d31869df86f12f08f28c345a503f6f0b3cac3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks