General

  • Target

    input 07.21.2021.doc

  • Size

    72KB

  • Sample

    210721-p6p4rt1wsa

  • MD5

    2405219be1d899e9d361e0f4458cff83

  • SHA1

    7dc5167b155ec70d09bba50290533fee5b7649ce

  • SHA256

    7ddb285312948e5156adf11beb10a5970ac6a02382c7a11ce3217c70358e596f

  • SHA512

    079879ded584395310ed36d6c2e1070875bdb42a316b1cd2b944d590e029a3b14f64ad18c7622a60fcaf9ef0ce13a7539f87bbd6472a6611867fd4a3d39102bb

Score
10/10

Malware Config

Targets

    • Target

      input 07.21.2021.doc

    • Size

      72KB

    • MD5

      2405219be1d899e9d361e0f4458cff83

    • SHA1

      7dc5167b155ec70d09bba50290533fee5b7649ce

    • SHA256

      7ddb285312948e5156adf11beb10a5970ac6a02382c7a11ce3217c70358e596f

    • SHA512

      079879ded584395310ed36d6c2e1070875bdb42a316b1cd2b944d590e029a3b14f64ad18c7622a60fcaf9ef0ce13a7539f87bbd6472a6611867fd4a3d39102bb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks