General

  • Target

    JUSTIFICANTE TRANSFERENCIA.xlsx

  • Size

    2.0MB

  • Sample

    210118-w7qjzmjd9x

  • MD5

    db38643af9b77bf55db95fbeeb921452

  • SHA1

    f5e2e36b20cf2f4c40dd27d8c68b0dbd09c3c505

  • SHA256

    2c5e3d15af1b6984f0462ccf500e7042f2db3996a979ce228e02fdd7016b14c2

  • SHA512

    0230b5154f72671944365340d212755abbbecb731db5f2e4e863f5bef06d5bcf5df43eacd3a5d4976d7ead79f1112cb1caa98e5f8fe454e06b70d45070140846

Score
8/10

Malware Config

Targets

    • Target

      JUSTIFICANTE TRANSFERENCIA.xlsx

    • Size

      2.0MB

    • MD5

      db38643af9b77bf55db95fbeeb921452

    • SHA1

      f5e2e36b20cf2f4c40dd27d8c68b0dbd09c3c505

    • SHA256

      2c5e3d15af1b6984f0462ccf500e7042f2db3996a979ce228e02fdd7016b14c2

    • SHA512

      0230b5154f72671944365340d212755abbbecb731db5f2e4e863f5bef06d5bcf5df43eacd3a5d4976d7ead79f1112cb1caa98e5f8fe454e06b70d45070140846

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks