General

  • Target

    files.05.21.doc

  • Size

    79KB

  • Sample

    210507-4tsnz15aqj

  • MD5

    1c61ab6f2bdf43b93bb5233f6ca6c5e4

  • SHA1

    8fc13c1610d5a040682cdd1d22e85f6ce2fda3d4

  • SHA256

    ccc7f7f06d6151aac48f2e5eb6162f58c49084c4d46c28d48222ebadff5b6e2d

  • SHA512

    67ca04cc899d14c9316147c3f4f7eff57f96a0420fca47ad78e233807832f750d3d5462c325f95b63a43ada15b308bc412cb0c0448fb725b7e30e1c8cee19885

Score
10/10

Malware Config

Targets

    • Target

      files.05.21.doc

    • Size

      79KB

    • MD5

      1c61ab6f2bdf43b93bb5233f6ca6c5e4

    • SHA1

      8fc13c1610d5a040682cdd1d22e85f6ce2fda3d4

    • SHA256

      ccc7f7f06d6151aac48f2e5eb6162f58c49084c4d46c28d48222ebadff5b6e2d

    • SHA512

      67ca04cc899d14c9316147c3f4f7eff57f96a0420fca47ad78e233807832f750d3d5462c325f95b63a43ada15b308bc412cb0c0448fb725b7e30e1c8cee19885

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks