General

  • Target

    2020_SOA_Payment_21Dec2020.xlsx

  • Size

    2.4MB

  • Sample

    210122-jmyk6mt36a

  • MD5

    2cdc1a820d72b36d6d4ed94c8ca9d68f

  • SHA1

    6defcb2d984e3bc2b5cea266e1d6a009646d6831

  • SHA256

    85d4c229751f2a80c801186ff3494ac4f18fc8ef88d4a81a808f2bcd81fd3a87

  • SHA512

    67f6353af1f30f205b21c3a22bb90639d215a9d90856052c6225d1f66c81bf14a20ec8cf667bb2fdf6d851f4c4459da2ca4cfb5af6d9647f7ae438b74dcfdeaf

Score
8/10

Malware Config

Targets

    • Target

      2020_SOA_Payment_21Dec2020.xlsx

    • Size

      2.4MB

    • MD5

      2cdc1a820d72b36d6d4ed94c8ca9d68f

    • SHA1

      6defcb2d984e3bc2b5cea266e1d6a009646d6831

    • SHA256

      85d4c229751f2a80c801186ff3494ac4f18fc8ef88d4a81a808f2bcd81fd3a87

    • SHA512

      67f6353af1f30f205b21c3a22bb90639d215a9d90856052c6225d1f66c81bf14a20ec8cf667bb2fdf6d851f4c4459da2ca4cfb5af6d9647f7ae438b74dcfdeaf

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks