General

  • Target

    document-1476281545.xls

  • Size

    331KB

  • Sample

    201126-tcxdc244s2

  • MD5

    82fb7a056636c96356080d85e31a12f9

  • SHA1

    773b8c1f05f2738444324c6f1a4013e241cb236a

  • SHA256

    9f2389febf1371de7577db50856191cdb0e5e99aa07020dfea70fd6c45d58bf0

  • SHA512

    2dcb4069ce23ddd84e401ecb68fb7544ff550ed76a74cfec2315b659bf7865e13837f6f52f4ebf96f7832df5dd89d7b363d57ffbb90170634275e0eedc40222e

Score
10/10

Malware Config

Targets

    • Target

      document-1476281545.xls

    • Size

      331KB

    • MD5

      82fb7a056636c96356080d85e31a12f9

    • SHA1

      773b8c1f05f2738444324c6f1a4013e241cb236a

    • SHA256

      9f2389febf1371de7577db50856191cdb0e5e99aa07020dfea70fd6c45d58bf0

    • SHA512

      2dcb4069ce23ddd84e401ecb68fb7544ff550ed76a74cfec2315b659bf7865e13837f6f52f4ebf96f7832df5dd89d7b363d57ffbb90170634275e0eedc40222e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks