General

  • Target

    particulars 05.21.doc

  • Size

    79KB

  • Sample

    210507-scftbyc4rs

  • MD5

    aede2279e9119fb59a149df05eebc033

  • SHA1

    63876f641ae31b27eb0358cbaa27d3d209d85846

  • SHA256

    71d43c3bd77297b86d32742576c043f274ff9becd515f4f477e56daa642ec92d

  • SHA512

    d1041a0af15d3f05f1d7e32ab65f352f5cca9b7b602bb9105e717877208847c23903ff1752b6a1c196c76f4f61d76015408c44877163dedb28e4663c8136d97b

Score
10/10

Malware Config

Targets

    • Target

      particulars 05.21.doc

    • Size

      79KB

    • MD5

      aede2279e9119fb59a149df05eebc033

    • SHA1

      63876f641ae31b27eb0358cbaa27d3d209d85846

    • SHA256

      71d43c3bd77297b86d32742576c043f274ff9becd515f4f477e56daa642ec92d

    • SHA512

      d1041a0af15d3f05f1d7e32ab65f352f5cca9b7b602bb9105e717877208847c23903ff1752b6a1c196c76f4f61d76015408c44877163dedb28e4663c8136d97b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks