General

  • Target

    instrument indenture.05.06.2021.doc

  • Size

    79KB

  • Sample

    210506-jex7cekcmn

  • MD5

    c4b0617006900fdfdd3eaa762c68a8ef

  • SHA1

    4ce54af01029c685759fe181dcc80633a0044630

  • SHA256

    453e7a4314783ccee4547d5be1f17bd841599bebe9f9f6d8d3ba0b05be7cb059

  • SHA512

    242fc7ce5d65647fd920d782d17427dec9e4cdd3e43f001fbb8dd04e35784e94bce2a4a7f7e76f1ebfa4675bdee7f5d426f2be54aa0e2a01781deb20199d0e12

Score
10/10

Malware Config

Targets

    • Target

      instrument indenture.05.06.2021.doc

    • Size

      79KB

    • MD5

      c4b0617006900fdfdd3eaa762c68a8ef

    • SHA1

      4ce54af01029c685759fe181dcc80633a0044630

    • SHA256

      453e7a4314783ccee4547d5be1f17bd841599bebe9f9f6d8d3ba0b05be7cb059

    • SHA512

      242fc7ce5d65647fd920d782d17427dec9e4cdd3e43f001fbb8dd04e35784e94bce2a4a7f7e76f1ebfa4675bdee7f5d426f2be54aa0e2a01781deb20199d0e12

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks