General

  • Target

    proforma invoice.docx

  • Size

    10KB

  • Sample

    210622-qhmdz1r8pn

  • MD5

    82f8c629f87ee2817431ee1caae6500c

  • SHA1

    39ab645187be422bef46f84c50e8dde6e382383a

  • SHA256

    1e5c7d755892b33d04097940dbc716232e7bde143119d25b282c532c242b5f7a

  • SHA512

    638b4f924fac05dd81a7063cdef8bd71172ccb12223f64a746ab919d70613bc75c83c1fd861cee7f3402de1c6d8b9e77e8363d17bea904b5dcb13635e73edc43

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://0147.0205.0152.0220/....---------------------------------/...............................................wiz

Targets

    • Target

      proforma invoice.docx

    • Size

      10KB

    • MD5

      82f8c629f87ee2817431ee1caae6500c

    • SHA1

      39ab645187be422bef46f84c50e8dde6e382383a

    • SHA256

      1e5c7d755892b33d04097940dbc716232e7bde143119d25b282c532c242b5f7a

    • SHA512

      638b4f924fac05dd81a7063cdef8bd71172ccb12223f64a746ab919d70613bc75c83c1fd861cee7f3402de1c6d8b9e77e8363d17bea904b5dcb13635e73edc43

    Score
    8/10
    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks