General

  • Target

    Walaa-Qasem-resume2.doc

  • Size

    300KB

  • Sample

    210122-pfr7amse36

  • MD5

    a16fcf40928723827ab9b7d9de5ad0cc

  • SHA1

    2cf05041a901ecc437f3475d67046dbc19a07398

  • SHA256

    d994f6056feaeaa9417b384ebfa6fad79af8cac013e6f044a23d64b52a5021f9

  • SHA512

    2765d802f6436ccb5a0c6cbe296e5bc7a91bec98984ec8568bfbe465500b1d5169ce3fb3c547849f0e71b2599cb505c0892a48802b590e2fa3db4e9aa6708514

Score
8/10

Malware Config

Targets

    • Target

      Walaa-Qasem-resume2.doc

    • Size

      300KB

    • MD5

      a16fcf40928723827ab9b7d9de5ad0cc

    • SHA1

      2cf05041a901ecc437f3475d67046dbc19a07398

    • SHA256

      d994f6056feaeaa9417b384ebfa6fad79af8cac013e6f044a23d64b52a5021f9

    • SHA512

      2765d802f6436ccb5a0c6cbe296e5bc7a91bec98984ec8568bfbe465500b1d5169ce3fb3c547849f0e71b2599cb505c0892a48802b590e2fa3db4e9aa6708514

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks