General

  • Target

    0112_812742622.doc

  • Size

    735KB

  • Sample

    210112-f2deben2we

  • MD5

    c72d6815d9d98f3f23cf3cadd269e674

  • SHA1

    8747b44c19f4dfdbdebd415ef5afbe7ddcfcc7f6

  • SHA256

    3ffe9ef810d01e9f242558ba59e8c7483adb72e087132cb0fd1e55171c45690f

  • SHA512

    a76f9d365fe0ec17377962e6c95cea75121a0132120d137305fa220cfa4096c8ff708278d39cdba60a95ddd23a570d76398111a582ff7a6f0b2f84a1a181654d

Score
10/10

Malware Config

Targets

    • Target

      0112_812742622.doc

    • Size

      735KB

    • MD5

      c72d6815d9d98f3f23cf3cadd269e674

    • SHA1

      8747b44c19f4dfdbdebd415ef5afbe7ddcfcc7f6

    • SHA256

      3ffe9ef810d01e9f242558ba59e8c7483adb72e087132cb0fd1e55171c45690f

    • SHA512

      a76f9d365fe0ec17377962e6c95cea75121a0132120d137305fa220cfa4096c8ff708278d39cdba60a95ddd23a570d76398111a582ff7a6f0b2f84a1a181654d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks