General

  • Target

    PO_P287712.docx

  • Size

    10KB

  • Sample

    210507-q35ameydce

  • MD5

    7944390cb49ca5a3506c501d3baefc2e

  • SHA1

    b38c42928d987c0aa8310a0ca0f890bfd848c580

  • SHA256

    2116db2813a5e945bfd759871a812d5fe75e8ace6f014bf042704d644de92064

  • SHA512

    693c0bcaa49481be389a6821557c57da73cc600499f21b3a6632b62c022378532b08e1dfd0bf3a1ec336ebec442390e1243ef9d74fa78c0dbef6f4fad1ee198a

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://cutt.ly/QbW9C7l

Targets

    • Target

      PO_P287712.docx

    • Size

      10KB

    • MD5

      7944390cb49ca5a3506c501d3baefc2e

    • SHA1

      b38c42928d987c0aa8310a0ca0f890bfd848c580

    • SHA256

      2116db2813a5e945bfd759871a812d5fe75e8ace6f014bf042704d644de92064

    • SHA512

      693c0bcaa49481be389a6821557c57da73cc600499f21b3a6632b62c022378532b08e1dfd0bf3a1ec336ebec442390e1243ef9d74fa78c0dbef6f4fad1ee198a

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks