General

  • Target

    document-1437303313.xls

  • Size

    331KB

  • Sample

    201126-vwhqmeceaj

  • MD5

    a294b421467298b9b51cede8209bd5f5

  • SHA1

    915d649219ba88144747412c413b30083e268f75

  • SHA256

    b34f1a37ea94eafeffa6e1ebac4dee16c4ad222fb12cf28c9ac88a61e5e92d17

  • SHA512

    a034169230e0f8e0291aea817f53d5f4d472e3934971baa6479606405b7b892b515b94e6249510cf824cb02c65a04cd43ddf26f4e628d6cbcfad19737a8a9ec4

Score
10/10

Malware Config

Targets

    • Target

      document-1437303313.xls

    • Size

      331KB

    • MD5

      a294b421467298b9b51cede8209bd5f5

    • SHA1

      915d649219ba88144747412c413b30083e268f75

    • SHA256

      b34f1a37ea94eafeffa6e1ebac4dee16c4ad222fb12cf28c9ac88a61e5e92d17

    • SHA512

      a034169230e0f8e0291aea817f53d5f4d472e3934971baa6479606405b7b892b515b94e6249510cf824cb02c65a04cd43ddf26f4e628d6cbcfad19737a8a9ec4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks