General

  • Target

    document-1521189458.xls

  • Size

    331KB

  • Sample

    201126-rd7r1c7yvx

  • MD5

    7463b391fedfaf7293b22251ea0439b8

  • SHA1

    347503bab9716eeafb2204911562cacfc8fb91ec

  • SHA256

    0a73d31be62ed11bd5e311fb4b217a7072069fb7acf6c266c6ed08dd0d0626ef

  • SHA512

    92b2d670ace1d1a012ffffdba2f790fa609f78cba6004afb93b15450ee1d0e4644fb575c9d4f4cd5bad4144dd1d00b92f66447b25fa5f936d493d0d549d85846

Score
10/10

Malware Config

Targets

    • Target

      document-1521189458.xls

    • Size

      331KB

    • MD5

      7463b391fedfaf7293b22251ea0439b8

    • SHA1

      347503bab9716eeafb2204911562cacfc8fb91ec

    • SHA256

      0a73d31be62ed11bd5e311fb4b217a7072069fb7acf6c266c6ed08dd0d0626ef

    • SHA512

      92b2d670ace1d1a012ffffdba2f790fa609f78cba6004afb93b15450ee1d0e4644fb575c9d4f4cd5bad4144dd1d00b92f66447b25fa5f936d493d0d549d85846

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks