General

  • Target

    document-1540074700.xls

  • Size

    331KB

  • Sample

    201126-vccs3wrv66

  • MD5

    3cdaccd254b3b79dc444fc216ab6a949

  • SHA1

    ffdad06812d76d86fc765f0f1cf632e94372b478

  • SHA256

    4f26985e85206b73c3fe9d4d12941e0f3e0f8ef61e42ca0f40639417187fa87c

  • SHA512

    1cbec98937ede3440e4e9e852928624003683dddb9560e45a879e279ea74226c7192aa2c4598b7162dbf01d4d871eb67e65f4093627f95c90c2fbe29f01583e2

Score
10/10

Malware Config

Targets

    • Target

      document-1540074700.xls

    • Size

      331KB

    • MD5

      3cdaccd254b3b79dc444fc216ab6a949

    • SHA1

      ffdad06812d76d86fc765f0f1cf632e94372b478

    • SHA256

      4f26985e85206b73c3fe9d4d12941e0f3e0f8ef61e42ca0f40639417187fa87c

    • SHA512

      1cbec98937ede3440e4e9e852928624003683dddb9560e45a879e279ea74226c7192aa2c4598b7162dbf01d4d871eb67e65f4093627f95c90c2fbe29f01583e2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks