General

  • Target

    Documents386.xlsm

  • Size

    57KB

  • Sample

    210315-4h3tvp6bee

  • MD5

    9dbad542b671f4e700258b2c58a9195b

  • SHA1

    0a24b5ba33f37c387a9895702959169f4f577bfa

  • SHA256

    3d799da3e93bebcb93e74ebf906a4690914aa338538eb7abe5627ff87e455da7

  • SHA512

    f50541f6c7059f7a61fe9896b6d0eccfedc34a5b3a81ee7232ea792d0946105c1070785decb54357a3b834a67a3fb37edeab4ab093a474d7a546b0f75b0a5647

Score
10/10

Malware Config

Targets

    • Target

      Documents386.xlsm

    • Size

      57KB

    • MD5

      9dbad542b671f4e700258b2c58a9195b

    • SHA1

      0a24b5ba33f37c387a9895702959169f4f577bfa

    • SHA256

      3d799da3e93bebcb93e74ebf906a4690914aa338538eb7abe5627ff87e455da7

    • SHA512

      f50541f6c7059f7a61fe9896b6d0eccfedc34a5b3a81ee7232ea792d0946105c1070785decb54357a3b834a67a3fb37edeab4ab093a474d7a546b0f75b0a5647

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks