General

  • Target

    decree 02.21.doc

  • Size

    78KB

  • Sample

    210309-ls3ggnvmen

  • MD5

    967d81224b1c80b5b9239cccb9236336

  • SHA1

    cbb7d5b651ea02435b429160145947277532f5ea

  • SHA256

    2ea1922048ee0cb2366563f5a7e959ac29aa7b2e60d1925b4eb06972f330111a

  • SHA512

    e7ff74a8afc20f3ebac9902b4829a0f52f4962da3208f4f2c27b7514ebad50e46fe6d652c0c39b4e088c51708d40bf2329dd507293a3c05faa8fd72bded0033c

Score
10/10

Malware Config

Targets

    • Target

      decree 02.21.doc

    • Size

      78KB

    • MD5

      967d81224b1c80b5b9239cccb9236336

    • SHA1

      cbb7d5b651ea02435b429160145947277532f5ea

    • SHA256

      2ea1922048ee0cb2366563f5a7e959ac29aa7b2e60d1925b4eb06972f330111a

    • SHA512

      e7ff74a8afc20f3ebac9902b4829a0f52f4962da3208f4f2c27b7514ebad50e46fe6d652c0c39b4e088c51708d40bf2329dd507293a3c05faa8fd72bded0033c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks