General

  • Target

    DHL-ADDRESS.xlsx

  • Size

    897KB

  • Sample

    210122-drcfv98td6

  • MD5

    153ca578a5ab10992e8cac275e297d85

  • SHA1

    ead8e4a6bda2e8570ef6585b22f01795ace04b5a

  • SHA256

    d5e5c359d5c4597eea30369c9d76c120e8aaef8d4ac3891281d46815ee07d8ee

  • SHA512

    d129791eafd8b057a0b51bb010529540b4294322fdfe71440564146594e8b308bff6f2b4672b64669fa7954bea6cec9301b1a2dd146a2e7d7116b14f1d94e2c1

Score
8/10

Malware Config

Targets

    • Target

      DHL-ADDRESS.xlsx

    • Size

      897KB

    • MD5

      153ca578a5ab10992e8cac275e297d85

    • SHA1

      ead8e4a6bda2e8570ef6585b22f01795ace04b5a

    • SHA256

      d5e5c359d5c4597eea30369c9d76c120e8aaef8d4ac3891281d46815ee07d8ee

    • SHA512

      d129791eafd8b057a0b51bb010529540b4294322fdfe71440564146594e8b308bff6f2b4672b64669fa7954bea6cec9301b1a2dd146a2e7d7116b14f1d94e2c1

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks