General

  • Target

    instruct 05.21.doc

  • Size

    79KB

  • Sample

    210510-anywj7yq82

  • MD5

    bf286f85a3b7893bead31dbe09feec4d

  • SHA1

    2c174a0a7dd939c186d99e6930176937e5c004e0

  • SHA256

    791a45eee838e037f6101691af2417eee3b5cccb96e9e9ab25ffce679471a6d9

  • SHA512

    fe88b0942223abd00218ec8712c12f399b6139d66ec74fc42acef0a085307057a2030c2c97eb68b935ac72d3ee9e62f6e645ab34fc950dc9617a2eb8f270e966

Score
10/10

Malware Config

Targets

    • Target

      instruct 05.21.doc

    • Size

      79KB

    • MD5

      bf286f85a3b7893bead31dbe09feec4d

    • SHA1

      2c174a0a7dd939c186d99e6930176937e5c004e0

    • SHA256

      791a45eee838e037f6101691af2417eee3b5cccb96e9e9ab25ffce679471a6d9

    • SHA512

      fe88b0942223abd00218ec8712c12f399b6139d66ec74fc42acef0a085307057a2030c2c97eb68b935ac72d3ee9e62f6e645ab34fc950dc9617a2eb8f270e966

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks