General

  • Target

    d3127b922e70794c42034aaf238cb358.xlsm

  • Size

    359KB

  • Sample

    210303-gh6djlra5a

  • MD5

    d3127b922e70794c42034aaf238cb358

  • SHA1

    0ab11895b528eeabf2e544567f0f467d27b7a1fb

  • SHA256

    8bac502d02aebef57de2e4b324a71cb0d843c7cc1c66082ab37405e83afa6993

  • SHA512

    860afda64d73a9761faaeb096cdb8294c93121e4b3c85bbae9e3c66f650234a9721c6801afd11af02b376936d3b6ad32ee20b7ce526ce54ded97e358b9a15284

Score
10/10

Malware Config

Targets

    • Target

      d3127b922e70794c42034aaf238cb358.xlsm

    • Size

      359KB

    • MD5

      d3127b922e70794c42034aaf238cb358

    • SHA1

      0ab11895b528eeabf2e544567f0f467d27b7a1fb

    • SHA256

      8bac502d02aebef57de2e4b324a71cb0d843c7cc1c66082ab37405e83afa6993

    • SHA512

      860afda64d73a9761faaeb096cdb8294c93121e4b3c85bbae9e3c66f650234a9721c6801afd11af02b376936d3b6ad32ee20b7ce526ce54ded97e358b9a15284

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks