General

  • Target

    document-1458779089.xls

  • Size

    331KB

  • Sample

    201126-s2fn94heyj

  • MD5

    cd1ac053f3c94bd6972a41c3fb7c4b9a

  • SHA1

    7dfcddcaf3becf07ca0f1e6402f00339e0e85e72

  • SHA256

    dd8569092f9bf9bda15c786dc8cad89ecb087a75a654abda1e29e5bcdbe5526a

  • SHA512

    1db69a0d0f4f7d6410c2ab7c7cfa9b4786df1285d14f9515016b211b1a2849b3279c4d65baa25f7024262709adecbd2bb07d7af975121074eb037966feafe478

Score
10/10

Malware Config

Targets

    • Target

      document-1458779089.xls

    • Size

      331KB

    • MD5

      cd1ac053f3c94bd6972a41c3fb7c4b9a

    • SHA1

      7dfcddcaf3becf07ca0f1e6402f00339e0e85e72

    • SHA256

      dd8569092f9bf9bda15c786dc8cad89ecb087a75a654abda1e29e5bcdbe5526a

    • SHA512

      1db69a0d0f4f7d6410c2ab7c7cfa9b4786df1285d14f9515016b211b1a2849b3279c4d65baa25f7024262709adecbd2bb07d7af975121074eb037966feafe478

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks