General

  • Target

    Report_18392.xls

  • Size

    762KB

  • Sample

    210114-55daqjba16

  • MD5

    0e453e483119e62e58471b9ee48a358b

  • SHA1

    8fb9f595b9474368f7acaf81d15437c0bbf5a578

  • SHA256

    122533a946908e660880b2030174008bbb0791e5c5ac92651b24ae0589e8fa3d

  • SHA512

    211c79149b10ba7fe4dd185c0decc0512cd74fc34ede6521a4599769909049fe6aae8630910c721c68c1e2724f3e63aff0e59f43655e3f0cb4037d0e183e2292

Score
10/10

Malware Config

Targets

    • Target

      Report_18392.xls

    • Size

      762KB

    • MD5

      0e453e483119e62e58471b9ee48a358b

    • SHA1

      8fb9f595b9474368f7acaf81d15437c0bbf5a578

    • SHA256

      122533a946908e660880b2030174008bbb0791e5c5ac92651b24ae0589e8fa3d

    • SHA512

      211c79149b10ba7fe4dd185c0decc0512cd74fc34ede6521a4599769909049fe6aae8630910c721c68c1e2724f3e63aff0e59f43655e3f0cb4037d0e183e2292

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks