General

  • Target

    document-1440220447.xls

  • Size

    332KB

  • Sample

    201126-vtrylmnqh6

  • MD5

    052b07d30b79ee820afaf3fe7152ce15

  • SHA1

    676b96303fcd3391f872e493c7230a6eb4ec68eb

  • SHA256

    4834f7d5ccb25c4b4771bd6de3e0af6e17c1a2552b7555f3384782a1b254097f

  • SHA512

    80ccfdf77e30cdf9b80e224b5d5261a39b2e26b2180fbec24c7c52634208c88fc61a8e8ad74e20db301e0407fb7a1a78b6e96928517802a9074ebbc06cda8b2a

Score
10/10

Malware Config

Targets

    • Target

      document-1440220447.xls

    • Size

      332KB

    • MD5

      052b07d30b79ee820afaf3fe7152ce15

    • SHA1

      676b96303fcd3391f872e493c7230a6eb4ec68eb

    • SHA256

      4834f7d5ccb25c4b4771bd6de3e0af6e17c1a2552b7555f3384782a1b254097f

    • SHA512

      80ccfdf77e30cdf9b80e224b5d5261a39b2e26b2180fbec24c7c52634208c88fc61a8e8ad74e20db301e0407fb7a1a78b6e96928517802a9074ebbc06cda8b2a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks