General

  • Target

    files_05.21.doc

  • Size

    75KB

  • Sample

    210506-npveldqhna

  • MD5

    f143869b5567d92152addee5f40b2544

  • SHA1

    641ba7fc05997aca01b83dfbaa078c86d4b6b7df

  • SHA256

    9e7906cf5f653a70e1a30828d805dcf165b50a7e664cb94de562771203219e21

  • SHA512

    655f4d350a12b39aadbdf7eae54c2e7f39bdd751bede45c28c044f207aef5e4e80abe3031b069331e76a28b2ae1e29438b4fe13815832bd9e25f6484bb1a62fd

Score
10/10

Malware Config

Targets

    • Target

      files_05.21.doc

    • Size

      75KB

    • MD5

      f143869b5567d92152addee5f40b2544

    • SHA1

      641ba7fc05997aca01b83dfbaa078c86d4b6b7df

    • SHA256

      9e7906cf5f653a70e1a30828d805dcf165b50a7e664cb94de562771203219e21

    • SHA512

      655f4d350a12b39aadbdf7eae54c2e7f39bdd751bede45c28c044f207aef5e4e80abe3031b069331e76a28b2ae1e29438b4fe13815832bd9e25f6484bb1a62fd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks