General

  • Target

    document-1513882981.xls

  • Size

    331KB

  • Sample

    201126-ztjedmlkke

  • MD5

    be7ae93c6a5702504b3627d6f447a06f

  • SHA1

    85eb6684fb967d7be6cf97f76a8e3f87407a147e

  • SHA256

    91fa7a563da3f62a30c43dd44452037c825ca9a50581c3db8f47160ccc602b31

  • SHA512

    a5ab24421d1e79de321feabe891e16a564d3c8b1db84c1d964a0b14a6c2c58086228f14015c646cf6700245be06a3a3142460faaefdac4349aced1859bdd9ce7

Score
10/10

Malware Config

Targets

    • Target

      document-1513882981.xls

    • Size

      331KB

    • MD5

      be7ae93c6a5702504b3627d6f447a06f

    • SHA1

      85eb6684fb967d7be6cf97f76a8e3f87407a147e

    • SHA256

      91fa7a563da3f62a30c43dd44452037c825ca9a50581c3db8f47160ccc602b31

    • SHA512

      a5ab24421d1e79de321feabe891e16a564d3c8b1db84c1d964a0b14a6c2c58086228f14015c646cf6700245be06a3a3142460faaefdac4349aced1859bdd9ce7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks