General

  • Target

    Register 2948 -69086.xlsm

  • Size

    184KB

  • Sample

    210719-2rwheaxhzj

  • MD5

    071084a63d40622cb858d6330af3ffd0

  • SHA1

    a1fb4785f9ea2329153897e7833d35d67e11d6ac

  • SHA256

    d68a1ed53bcc16ba9e7cff9326ff3f327038daddf071ec567f8d79dfed851352

  • SHA512

    dad242f4cd254722f024bbdadf7fd53d1fa83500e02cd6657a57d44dc26477a80fa20ce983e898e476652c23551c6392136bcef40cc52c480526d2f61815da43

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fourstars.cyou/1.php

Targets

    • Target

      Register 2948 -69086.xlsm

    • Size

      184KB

    • MD5

      071084a63d40622cb858d6330af3ffd0

    • SHA1

      a1fb4785f9ea2329153897e7833d35d67e11d6ac

    • SHA256

      d68a1ed53bcc16ba9e7cff9326ff3f327038daddf071ec567f8d79dfed851352

    • SHA512

      dad242f4cd254722f024bbdadf7fd53d1fa83500e02cd6657a57d44dc26477a80fa20ce983e898e476652c23551c6392136bcef40cc52c480526d2f61815da43

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks