General

  • Target

    New Purchase Order.ppt

  • Size

    66KB

  • Sample

    210305-nfvsdywys2

  • MD5

    20884369d25aeb20f8a45c464cab0ff4

  • SHA1

    c81fe784cb90f374d6790fad65a0144f9bfce85f

  • SHA256

    0d8264e6c9f93db868184bedfd0c54b5ad4ab8dd81b90c2e2106da6c1e9a4d3b

  • SHA512

    9a0779d95cbd8dcd73a827da6e3654b1a55508f4b6886e9cd7b5e628833b54bb5c147aa966d0afa39b8cd4fa47d9b4155be62e752aa331a5f872f67a82048c07

Score
10/10

Malware Config

Targets

    • Target

      New Purchase Order.ppt

    • Size

      66KB

    • MD5

      20884369d25aeb20f8a45c464cab0ff4

    • SHA1

      c81fe784cb90f374d6790fad65a0144f9bfce85f

    • SHA256

      0d8264e6c9f93db868184bedfd0c54b5ad4ab8dd81b90c2e2106da6c1e9a4d3b

    • SHA512

      9a0779d95cbd8dcd73a827da6e3654b1a55508f4b6886e9cd7b5e628833b54bb5c147aa966d0afa39b8cd4fa47d9b4155be62e752aa331a5f872f67a82048c07

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks