General

  • Target

    Document29429.xls

  • Size

    266KB

  • Sample

    210225-g8p5s7h9s6

  • MD5

    5354f07ee5b77ebc0ac791db52887244

  • SHA1

    c142b55accd0fc4672f61df8ea3fb9ef07ed0923

  • SHA256

    99fb5cd31df57af36dd39f19df63d7484e2db31a0d6abfb18e4d94bd77806bd0

  • SHA512

    609ef3a278e956c332243389de233956015bd3b9a0b0060f2eb3ed80516bd950f199eb2429926cdd848301e71b2b5d023eb8d7491c6e4b943c466cda7fdce7fc

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://promo.physio123.com/ds/1702.gif

Targets

    • Target

      Document29429.xls

    • Size

      266KB

    • MD5

      5354f07ee5b77ebc0ac791db52887244

    • SHA1

      c142b55accd0fc4672f61df8ea3fb9ef07ed0923

    • SHA256

      99fb5cd31df57af36dd39f19df63d7484e2db31a0d6abfb18e4d94bd77806bd0

    • SHA512

      609ef3a278e956c332243389de233956015bd3b9a0b0060f2eb3ed80516bd950f199eb2429926cdd848301e71b2b5d023eb8d7491c6e4b943c466cda7fdce7fc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks