General

  • Target

    document-1791410631.xls

  • Size

    86KB

  • Sample

    210304-h1enhykljs

  • MD5

    48979d073c67621ec20b82f0c1df8ae4

  • SHA1

    0b5e3752da37c22e33c6011d08f5e73633f1887a

  • SHA256

    b5ec0c951047e780a5b1a3edc91d53d54c6874fc5f60dd1d3761e1fc34b7adb8

  • SHA512

    1efc766f320f9a6e0cdb0aa0c3817932c8c060f4546bd65b657b3e5de16ce79a440d6684260a27b6c09af07dc41691276408bcb43f6984fbfe7854d8fec42cec

Score
10/10

Malware Config

Targets

    • Target

      document-1791410631.xls

    • Size

      86KB

    • MD5

      48979d073c67621ec20b82f0c1df8ae4

    • SHA1

      0b5e3752da37c22e33c6011d08f5e73633f1887a

    • SHA256

      b5ec0c951047e780a5b1a3edc91d53d54c6874fc5f60dd1d3761e1fc34b7adb8

    • SHA512

      1efc766f320f9a6e0cdb0aa0c3817932c8c060f4546bd65b657b3e5de16ce79a440d6684260a27b6c09af07dc41691276408bcb43f6984fbfe7854d8fec42cec

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks