General

  • Target

    Invoice #535576.xlsm

  • Size

    161KB

  • Sample

    210421-pd29bffx96

  • MD5

    c02eba6c5cb189c3dfd85199b785077b

  • SHA1

    7b1c517e64a46840a9da597496325a30ab7f42a1

  • SHA256

    3bd55c9e2fdcd1b707612af00bcc75f5e11640d9d9952ddf3a68d107f27f9102

  • SHA512

    d3d88facce07bc5bb573ec6cb895e40220c5dca9e36437aaf19739fd6ec6c38473cee8c2a82ec0ee411404e6b9e62c68d2cc2761346087c41d1dca524e0809bb

Score
10/10

Malware Config

Targets

    • Target

      Invoice #535576.xlsm

    • Size

      161KB

    • MD5

      c02eba6c5cb189c3dfd85199b785077b

    • SHA1

      7b1c517e64a46840a9da597496325a30ab7f42a1

    • SHA256

      3bd55c9e2fdcd1b707612af00bcc75f5e11640d9d9952ddf3a68d107f27f9102

    • SHA512

      d3d88facce07bc5bb573ec6cb895e40220c5dca9e36437aaf19739fd6ec6c38473cee8c2a82ec0ee411404e6b9e62c68d2cc2761346087c41d1dca524e0809bb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks