General

  • Target

    FV051021.xls

  • Size

    37KB

  • Sample

    210510-ckxng779ga

  • MD5

    950855b20d993acd341e87feaa208037

  • SHA1

    973f3a8ac29ad715ec649e9785738f60fe0a2d48

  • SHA256

    b96965d845c925b8dc0f3e4279ad4e571c1409891fee795bde704c5b1f063ce9

  • SHA512

    782da77b08b8ae44bc4913c73d377b9c3f88a8c39685dca2d3f1cbc7e2c5174d33cc3346b1b6f1f686ef59f8c572e8ac074e5446d9441b97e3b1d93f159cdc3c

Score
10/10

Malware Config

Targets

    • Target

      FV051021.xls

    • Size

      37KB

    • MD5

      950855b20d993acd341e87feaa208037

    • SHA1

      973f3a8ac29ad715ec649e9785738f60fe0a2d48

    • SHA256

      b96965d845c925b8dc0f3e4279ad4e571c1409891fee795bde704c5b1f063ce9

    • SHA512

      782da77b08b8ae44bc4913c73d377b9c3f88a8c39685dca2d3f1cbc7e2c5174d33cc3346b1b6f1f686ef59f8c572e8ac074e5446d9441b97e3b1d93f159cdc3c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Use of msiexec (install) with remote resource

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks