General

  • Target

    Cancellation-1125603261-03112021.xls

  • Size

    277KB

  • Sample

    210311-erlpye9g1a

  • MD5

    cfb7d257cd293381f443a5604799e148

  • SHA1

    7d25e5686c01f8dab4aaeed7d982c3cd6e201a2e

  • SHA256

    dd741f4393167f64451b10b96113217b48aaa80307a38cd3d66b2aa52eb1c8ab

  • SHA512

    47acd9c400075d39ef6821826225064ad53039254eb4f45c6d50e6ccc11a5120d080fe3e4f064f32787af8b6e79f99b0979ec345f9af1d79d1645cd9081bffbe

Score
10/10

Malware Config

Targets

    • Target

      Cancellation-1125603261-03112021.xls

    • Size

      277KB

    • MD5

      cfb7d257cd293381f443a5604799e148

    • SHA1

      7d25e5686c01f8dab4aaeed7d982c3cd6e201a2e

    • SHA256

      dd741f4393167f64451b10b96113217b48aaa80307a38cd3d66b2aa52eb1c8ab

    • SHA512

      47acd9c400075d39ef6821826225064ad53039254eb4f45c6d50e6ccc11a5120d080fe3e4f064f32787af8b6e79f99b0979ec345f9af1d79d1645cd9081bffbe

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks