General

  • Target

    document-1479658044.xls

  • Size

    331KB

  • Sample

    201126-sfw9ey9aea

  • MD5

    6cdb43f669589f8247a2afbedd48fe3c

  • SHA1

    0f619106fc76ed26d341d6c6dbe346437baa1691

  • SHA256

    c748f9f614569bba06b6312585483f2f24f7d2711cc926c8e34ebb8e31e79fde

  • SHA512

    b76355c3b4fdad9d033a4d975aafddb1307ec72ba913955c58e610b5b02e526d6441b38e2d4d80f0f1f8ed7a0e0b8cee0b7746f700dae507844a150ffd00df06

Score
10/10

Malware Config

Targets

    • Target

      document-1479658044.xls

    • Size

      331KB

    • MD5

      6cdb43f669589f8247a2afbedd48fe3c

    • SHA1

      0f619106fc76ed26d341d6c6dbe346437baa1691

    • SHA256

      c748f9f614569bba06b6312585483f2f24f7d2711cc926c8e34ebb8e31e79fde

    • SHA512

      b76355c3b4fdad9d033a4d975aafddb1307ec72ba913955c58e610b5b02e526d6441b38e2d4d80f0f1f8ed7a0e0b8cee0b7746f700dae507844a150ffd00df06

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks