General

  • Target

    OMSMarineServices_order.xlsx

  • Size

    466KB

  • Sample

    210413-2edvnjre9n

  • MD5

    24bd4a3d25c469bb138fb16e587dbf02

  • SHA1

    563d37fde327ea4fb70fa3959079f72161711722

  • SHA256

    6f8debb6acde9b5b878188327ea348102cc125e8f72245f79fb39967821a91fa

  • SHA512

    cb05bdf0fb51ef2fe2a7f93f2c32f3a8ebe3c720642052c2cdc1eda9ba3c5bcd555187d890df5f41d83229d0081a874c1ae6c1e2252a30880dd1450cf1bbd883

Score
8/10

Malware Config

Targets

    • Target

      OMSMarineServices_order.xlsx

    • Size

      466KB

    • MD5

      24bd4a3d25c469bb138fb16e587dbf02

    • SHA1

      563d37fde327ea4fb70fa3959079f72161711722

    • SHA256

      6f8debb6acde9b5b878188327ea348102cc125e8f72245f79fb39967821a91fa

    • SHA512

      cb05bdf0fb51ef2fe2a7f93f2c32f3a8ebe3c720642052c2cdc1eda9ba3c5bcd555187d890df5f41d83229d0081a874c1ae6c1e2252a30880dd1450cf1bbd883

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks