Resubmissions

04-03-2021 13:24

210304-nqh5pdva82 10

04-03-2021 13:22

210304-9e8k9xp1g2 10

General

  • Target

    sample.ppt

  • Size

    99KB

  • Sample

    210304-9e8k9xp1g2

  • MD5

    0b19fe1649d25a2eb880e34b1f080eee

  • SHA1

    adc25308fd98111bcb78db084b8c74a74bcef290

  • SHA256

    e28c4c94de8fa6d679b94be0c095623c904f40a14bd6afaa3851b6a3274810d7

  • SHA512

    278084c5c0dbfca65252325d396fc39c7700f4fc6d37093efd230fbb1dbb4d3b350c4a303ce1d63cb9419995a46cc2ec8db95ab8b1cbf95f73ed8ba497a865e0

Score
10/10

Malware Config

Targets

    • Target

      sample.ppt

    • Size

      99KB

    • MD5

      0b19fe1649d25a2eb880e34b1f080eee

    • SHA1

      adc25308fd98111bcb78db084b8c74a74bcef290

    • SHA256

      e28c4c94de8fa6d679b94be0c095623c904f40a14bd6afaa3851b6a3274810d7

    • SHA512

      278084c5c0dbfca65252325d396fc39c7700f4fc6d37093efd230fbb1dbb4d3b350c4a303ce1d63cb9419995a46cc2ec8db95ab8b1cbf95f73ed8ba497a865e0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Remote System Discovery

1
T1018

Tasks