General

  • Target

    deed contract-05.21.doc

  • Size

    76KB

  • Sample

    210510-j4qdxtdknx

  • MD5

    b62f53839c95c52d1271211e97dee0b6

  • SHA1

    4260efcc3db3b5ffc3725404f60180784437a6f5

  • SHA256

    b2e822ea0272723c3b4d4e177486823dc1ac0799082e8460e7fb35cde9443167

  • SHA512

    650f41cfd97c1cca13a1e25a5416f968b40cbf08166371d937b65dd4bb87926c8975b16c754f07486525dee08fd7d47699a2ef411fb6a7d5a41491dff6a8dece

Score
10/10

Malware Config

Targets

    • Target

      deed contract-05.21.doc

    • Size

      76KB

    • MD5

      b62f53839c95c52d1271211e97dee0b6

    • SHA1

      4260efcc3db3b5ffc3725404f60180784437a6f5

    • SHA256

      b2e822ea0272723c3b4d4e177486823dc1ac0799082e8460e7fb35cde9443167

    • SHA512

      650f41cfd97c1cca13a1e25a5416f968b40cbf08166371d937b65dd4bb87926c8975b16c754f07486525dee08fd7d47699a2ef411fb6a7d5a41491dff6a8dece

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks