General

  • Target

    workout_L000000000.xlsb

  • Size

    334KB

  • Sample

    210722-9khqzaalp2

  • MD5

    3121437a9424d2150795147873cbf518

  • SHA1

    5dceca167e8e5271a9d3b9a01e2861323e99c0a6

  • SHA256

    495bfc6fca2bcdb3e5b5b7994efda1218eacee883c280afada9e88d7b48d512d

  • SHA512

    72582bccd674fd88490aefde30c1da74474ca4413faa104ca24c759b2ba05b07759bcb7340a3b42b85a12b99ec9521091be7f0d7e09c619c5c9be004eef6b89a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      workout_L000000000.xlsb

    • Size

      334KB

    • MD5

      3121437a9424d2150795147873cbf518

    • SHA1

      5dceca167e8e5271a9d3b9a01e2861323e99c0a6

    • SHA256

      495bfc6fca2bcdb3e5b5b7994efda1218eacee883c280afada9e88d7b48d512d

    • SHA512

      72582bccd674fd88490aefde30c1da74474ca4413faa104ca24c759b2ba05b07759bcb7340a3b42b85a12b99ec9521091be7f0d7e09c619c5c9be004eef6b89a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks