General

  • Target

    637157-211036-853667.xlsm

  • Size

    140KB

  • Sample

    210721-3nvzbefqje

  • MD5

    a1fc90a0d2d73cb38e96158308a4d984

  • SHA1

    711c9d1bbc54f1b217fd1816c78b6979e5c52128

  • SHA256

    5a11b806245bbcf538179ea2805929db01e9df9fc792e577ebe0b1c4694e9a32

  • SHA512

    58ee83e1efd6171325d9c5d88f18a8492161d7f767e7c0f90d5315f1ac844598ce4d5e0048ecbdc561f3492f8f0044e733f029cd218b1661f909d1a9641db7d4

Score
10/10

Malware Config

Targets

    • Target

      637157-211036-853667.xlsm

    • Size

      140KB

    • MD5

      a1fc90a0d2d73cb38e96158308a4d984

    • SHA1

      711c9d1bbc54f1b217fd1816c78b6979e5c52128

    • SHA256

      5a11b806245bbcf538179ea2805929db01e9df9fc792e577ebe0b1c4694e9a32

    • SHA512

      58ee83e1efd6171325d9c5d88f18a8492161d7f767e7c0f90d5315f1ac844598ce4d5e0048ecbdc561f3492f8f0044e733f029cd218b1661f909d1a9641db7d4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks