General

  • Target

    Order_00009.xlsx

  • Size

    1.4MB

  • Sample

    210114-vmdm19ytye

  • MD5

    f99314a2a08dbbc7ddff20a83f1a5f32

  • SHA1

    1914f9f5eedef3300ced36713b4bea07597679c4

  • SHA256

    2f3772ae0a61ae1f913ba2e34f97dd86e7c2e619bc839171f8ff67cb06fbb209

  • SHA512

    909da3c17d063e12f01f5fc8cbe3bf0e57f6a595c686952e4942d5a337ea373f464a95a053ccbdf9b3fd0fef69b6ba2f95153fe3ccb6c6cc2c1f9ca6e021b355

Score
8/10

Malware Config

Targets

    • Target

      Order_00009.xlsx

    • Size

      1.4MB

    • MD5

      f99314a2a08dbbc7ddff20a83f1a5f32

    • SHA1

      1914f9f5eedef3300ced36713b4bea07597679c4

    • SHA256

      2f3772ae0a61ae1f913ba2e34f97dd86e7c2e619bc839171f8ff67cb06fbb209

    • SHA512

      909da3c17d063e12f01f5fc8cbe3bf0e57f6a595c686952e4942d5a337ea373f464a95a053ccbdf9b3fd0fef69b6ba2f95153fe3ccb6c6cc2c1f9ca6e021b355

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks