General

  • Target

    Doc.doc

  • Size

    160KB

  • Sample

    210114-28aagmd5r6

  • MD5

    7fab2596cbc1fe4174e56fe4caff12b9

  • SHA1

    443f9af0c72af3e041e5e35d55bf0bf82f7163ae

  • SHA256

    ca72798bc8151d0082881979efaaef8b0c259b7abe0872ba25fcf6148ab5bb8f

  • SHA512

    3f21e2d965ac1e7fd77d149c59e7fa440dde940c933d0d73de07055e6379c8ee70ac0eb51d82cd23f04247ce8e18e681112af5c6539ea0116c5bc3d9580fdc44

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://ketorecipesfit.com/wp-admin/afanv/

exe.dropper

http://mertelofis.com/wp-content/As0/

exe.dropper

http://givingthanksdaily.com/CP/

exe.dropper

http://datawyse.net/0X3QY/

exe.dropper

http://cs.lcxxny.com/wp-includes/E3U8nn/

exe.dropper

http://makiyazhdoma.ru/blocked/tgEeW8M/

exe.dropper

http://trustseal.enamad.ir.redshopfa.com/admit/wJJvvG/

Targets

    • Target

      Doc.doc

    • Size

      160KB

    • MD5

      7fab2596cbc1fe4174e56fe4caff12b9

    • SHA1

      443f9af0c72af3e041e5e35d55bf0bf82f7163ae

    • SHA256

      ca72798bc8151d0082881979efaaef8b0c259b7abe0872ba25fcf6148ab5bb8f

    • SHA512

      3f21e2d965ac1e7fd77d149c59e7fa440dde940c933d0d73de07055e6379c8ee70ac0eb51d82cd23f04247ce8e18e681112af5c6539ea0116c5bc3d9580fdc44

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks