General

  • Target

    XsPMC.xlsm

  • Size

    308KB

  • Sample

    210722-7yeaav6acs

  • MD5

    7d1241c321323ef058174eab91abe9f5

  • SHA1

    e7f4a2edfaa2f7c01f3f37e79e2fc6422f522152

  • SHA256

    6b20732f3ec329ae7463b4c4eddc6497d3a5f0ca7029b186b41078b762bf9339

  • SHA512

    dfd47243bf944ac672f186a950ffe782fef5eebae8cde3db0a0d10465aca11e485acba3a9178d9d8cb821143493af84bef2da7242b421e92ad9a1762f83b73c1

Score
10/10

Malware Config

Targets

    • Target

      XsPMC.xlsm

    • Size

      308KB

    • MD5

      7d1241c321323ef058174eab91abe9f5

    • SHA1

      e7f4a2edfaa2f7c01f3f37e79e2fc6422f522152

    • SHA256

      6b20732f3ec329ae7463b4c4eddc6497d3a5f0ca7029b186b41078b762bf9339

    • SHA512

      dfd47243bf944ac672f186a950ffe782fef5eebae8cde3db0a0d10465aca11e485acba3a9178d9d8cb821143493af84bef2da7242b421e92ad9a1762f83b73c1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks