General

  • Target

    document-1507557211.xls

  • Size

    331KB

  • Sample

    201126-xgemt53grs

  • MD5

    a41b33c978d44c561f745e4ba6b17a9b

  • SHA1

    9c0a2cb0ea5268da0c48361cf3e7979fdcd4fff4

  • SHA256

    42edd5cae87812ce4be7ab203000e14ac52fd795d596e45c119b5526a2624405

  • SHA512

    2b6f2c6539373700b2a167401de04e02ff4ae1594e4d17a5b0169fd3258818b39d590d03cb7272043b2884bd0778c4a4ba54881477ecdb5e85ecbf45277f9000

Score
10/10

Malware Config

Targets

    • Target

      document-1507557211.xls

    • Size

      331KB

    • MD5

      a41b33c978d44c561f745e4ba6b17a9b

    • SHA1

      9c0a2cb0ea5268da0c48361cf3e7979fdcd4fff4

    • SHA256

      42edd5cae87812ce4be7ab203000e14ac52fd795d596e45c119b5526a2624405

    • SHA512

      2b6f2c6539373700b2a167401de04e02ff4ae1594e4d17a5b0169fd3258818b39d590d03cb7272043b2884bd0778c4a4ba54881477ecdb5e85ecbf45277f9000

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks