General

  • Target

    Attach_1173795677_35048458.xls

  • Size

    141KB

  • Sample

    210224-46wch7kdde

  • MD5

    00aeae3f7461f896f1c2fcf505f7dc05

  • SHA1

    6c102b19e8af7234b073f61f5bd21e6cbe655897

  • SHA256

    269e90bae09cfe1649937e5dd2763b7136531ca2b6b85963ebd11915e6027dbc

  • SHA512

    91d20d053e7094b98c4572cbadcdb6713916f9a9d5f93a2bd61f65381b8becfc5a2205d1a70797ef7c2d4e20ab8cd005806df982a355e4aac2e1936e30062e27

Score
10/10

Malware Config

Targets

    • Target

      Attach_1173795677_35048458.xls

    • Size

      141KB

    • MD5

      00aeae3f7461f896f1c2fcf505f7dc05

    • SHA1

      6c102b19e8af7234b073f61f5bd21e6cbe655897

    • SHA256

      269e90bae09cfe1649937e5dd2763b7136531ca2b6b85963ebd11915e6027dbc

    • SHA512

      91d20d053e7094b98c4572cbadcdb6713916f9a9d5f93a2bd61f65381b8becfc5a2205d1a70797ef7c2d4e20ab8cd005806df982a355e4aac2e1936e30062e27

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks