General

  • Target

    Invoice_273.xlsm

  • Size

    164KB

  • Sample

    210421-hnxsjn8b2s

  • MD5

    599ce087cc5f550db5e6af6133b6be19

  • SHA1

    4025f5bfe38452647ce0796e3820960702d90b41

  • SHA256

    fe3d4647da281e7f5063094c332b3896cff4a1a4d021d1c00295e674ae7a7be9

  • SHA512

    78ac9fa93e78f03bf0c027640de08ab763d3a12dc0ff33ada9987b8ccb0f719652148f245af44701625f66564c06272781e96118fbc933ce04d42d906ebbd786

Score
10/10

Malware Config

Targets

    • Target

      Invoice_273.xlsm

    • Size

      164KB

    • MD5

      599ce087cc5f550db5e6af6133b6be19

    • SHA1

      4025f5bfe38452647ce0796e3820960702d90b41

    • SHA256

      fe3d4647da281e7f5063094c332b3896cff4a1a4d021d1c00295e674ae7a7be9

    • SHA512

      78ac9fa93e78f03bf0c027640de08ab763d3a12dc0ff33ada9987b8ccb0f719652148f245af44701625f66564c06272781e96118fbc933ce04d42d906ebbd786

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks