General

  • Target

    document-1448745111.xls

  • Size

    331KB

  • Sample

    201126-zrzz94hnqs

  • MD5

    51bdb9d3b04c8f6d463764f764266cb2

  • SHA1

    007d6b50c6018f671c20621281f9f2f75ea17d0e

  • SHA256

    b2811c202ab24a37b0db936d9eddb322dd8a40d43f63d9b1877da47564fe7ebc

  • SHA512

    b28ec7fa361825e0425983f76b3fac37f8cd01fdb026fa193b1141cafc350f3172e9b4d2a62420049978ed8d489eb55e8f48ae1a517d6f1ea91d3d84115ae3bb

Score
10/10

Malware Config

Targets

    • Target

      document-1448745111.xls

    • Size

      331KB

    • MD5

      51bdb9d3b04c8f6d463764f764266cb2

    • SHA1

      007d6b50c6018f671c20621281f9f2f75ea17d0e

    • SHA256

      b2811c202ab24a37b0db936d9eddb322dd8a40d43f63d9b1877da47564fe7ebc

    • SHA512

      b28ec7fa361825e0425983f76b3fac37f8cd01fdb026fa193b1141cafc350f3172e9b4d2a62420049978ed8d489eb55e8f48ae1a517d6f1ea91d3d84115ae3bb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks