General

  • Target

    0304_56958375050481.doc

  • Size

    743KB

  • Sample

    210304-mfyj9a8df2

  • MD5

    7ba91fe733a2b27af2c602525151305d

  • SHA1

    0c4f2f591db5e0bd0ce580649582f818a9da5179

  • SHA256

    e9e50934dd76164022730125fc00cbe2467afd6e234d2c4873273d4bc6acafe8

  • SHA512

    9d524efdcb0744e3a8b3bf13b234d8e9f595354ad3d143177e2da3ad9248122d403d596e38fa5055150eecc5866257c2f90bf6fdb9309acd5c67321b480ca4aa

Score
10/10

Malware Config

Targets

    • Target

      0304_56958375050481.doc

    • Size

      743KB

    • MD5

      7ba91fe733a2b27af2c602525151305d

    • SHA1

      0c4f2f591db5e0bd0ce580649582f818a9da5179

    • SHA256

      e9e50934dd76164022730125fc00cbe2467afd6e234d2c4873273d4bc6acafe8

    • SHA512

      9d524efdcb0744e3a8b3bf13b234d8e9f595354ad3d143177e2da3ad9248122d403d596e38fa5055150eecc5866257c2f90bf6fdb9309acd5c67321b480ca4aa

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks