General

  • Target

    917661-360471-585554.xlsm

  • Size

    140KB

  • Sample

    210721-v6r1xrdjf2

  • MD5

    544e73f142414024f15bdd34b80038bf

  • SHA1

    ff39e6d9c11ebfea8b5a048fd75779d1f0d00c30

  • SHA256

    438d6732eaeeb91b31df0f21d39eabd2fce3737c2fcd80d76c47fcfb473b988e

  • SHA512

    b98ee3a2ad80d7f942ac3a5c2456f08fbd167c72c6a703d0052397775c39cd2e462bf6c0bdacaaaa5badc6b5257fc7b33ad7353a2661d6f382129672999f6535

Score
10/10

Malware Config

Targets

    • Target

      917661-360471-585554.xlsm

    • Size

      140KB

    • MD5

      544e73f142414024f15bdd34b80038bf

    • SHA1

      ff39e6d9c11ebfea8b5a048fd75779d1f0d00c30

    • SHA256

      438d6732eaeeb91b31df0f21d39eabd2fce3737c2fcd80d76c47fcfb473b988e

    • SHA512

      b98ee3a2ad80d7f942ac3a5c2456f08fbd167c72c6a703d0052397775c39cd2e462bf6c0bdacaaaa5badc6b5257fc7b33ad7353a2661d6f382129672999f6535

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks