General

  • Target

    document-1481025349.xls

  • Size

    331KB

  • Sample

    201126-w8rk14wfvs

  • MD5

    c4637393c47a93d425f9832a98c8dd2f

  • SHA1

    526a1790a9705ac2bc116f2c0daef6bfc844b14b

  • SHA256

    f719b666bf5a08808acf20dde9ccf28c9b72f696fbdb3edaf8e2b0e8aec1d190

  • SHA512

    c188391bfc5c1a8dc0ad3790d7829196239915c8a15434726074e0fe0648e11a290c594b0c5e8651783743104b68445736fbb7ab40a08c5f3cb0af85702c715e

Score
10/10

Malware Config

Targets

    • Target

      document-1481025349.xls

    • Size

      331KB

    • MD5

      c4637393c47a93d425f9832a98c8dd2f

    • SHA1

      526a1790a9705ac2bc116f2c0daef6bfc844b14b

    • SHA256

      f719b666bf5a08808acf20dde9ccf28c9b72f696fbdb3edaf8e2b0e8aec1d190

    • SHA512

      c188391bfc5c1a8dc0ad3790d7829196239915c8a15434726074e0fe0648e11a290c594b0c5e8651783743104b68445736fbb7ab40a08c5f3cb0af85702c715e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks