General

  • Target

    sample.xlsm

  • Size

    83KB

  • Sample

    210505-h6e557ygse

  • MD5

    bb6fc5f43fe2e829d3cad6f5b906046f

  • SHA1

    8a2b0c47801d6817d2b6021516623a2d9c6542fa

  • SHA256

    806cbd4bab7e77c8a90661c5f92d347ac3e6ba869f1ff1f7b27c5e289ff105ff

  • SHA512

    4a6d83cf5cfd788ddba7a15dfb7396805552c816cb6f615b87101b22789e8b1e1032799f1be1f8110f9ef89f6688e3b8476f95916b37eb6901fe3aa39a214bf3

Score
10/10

Malware Config

Targets

    • Target

      sample.xlsm

    • Size

      83KB

    • MD5

      bb6fc5f43fe2e829d3cad6f5b906046f

    • SHA1

      8a2b0c47801d6817d2b6021516623a2d9c6542fa

    • SHA256

      806cbd4bab7e77c8a90661c5f92d347ac3e6ba869f1ff1f7b27c5e289ff105ff

    • SHA512

      4a6d83cf5cfd788ddba7a15dfb7396805552c816cb6f615b87101b22789e8b1e1032799f1be1f8110f9ef89f6688e3b8476f95916b37eb6901fe3aa39a214bf3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks