General

  • Target

    document-1456597551.xls

  • Size

    332KB

  • Sample

    201126-pwztb26czs

  • MD5

    45c1f1e1b2cb4cc80e1bc2d2dc57e0d0

  • SHA1

    99279b953a29d1f88491b453f133f24e8b966571

  • SHA256

    43f1dfb0aa7ce306bbba23170c4fa3d4b6fd85434a1aca666948b4d60995557b

  • SHA512

    a0a1725b7d9089e774a87f50da549ce5aa36dce505ca8d2007cbde4da29d83aa6a408b2536cd94f17ca975eca602d945ad777b111f096ac7b46ee40514069166

Score
10/10

Malware Config

Targets

    • Target

      document-1456597551.xls

    • Size

      332KB

    • MD5

      45c1f1e1b2cb4cc80e1bc2d2dc57e0d0

    • SHA1

      99279b953a29d1f88491b453f133f24e8b966571

    • SHA256

      43f1dfb0aa7ce306bbba23170c4fa3d4b6fd85434a1aca666948b4d60995557b

    • SHA512

      a0a1725b7d9089e774a87f50da549ce5aa36dce505ca8d2007cbde4da29d83aa6a408b2536cd94f17ca975eca602d945ad777b111f096ac7b46ee40514069166

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks