General

  • Target

    figures 07.21.doc

  • Size

    55KB

  • Sample

    210722-bxw6zp5l3a

  • MD5

    9a412628585242c2fd670a1f014c829c

  • SHA1

    cebe9944eb0920f40328328882825b35705db4ea

  • SHA256

    a500778d298b461bfcb674459951cf37d64c32cc036617c3fe1fcea153bbf1f4

  • SHA512

    c877996419988d0a3dd3f23053cbb3d6e7d51c90cd2568dd58d5a0a734ace283b6a3fdf1c3e1c8cb9d67b09d2183ba92d330a03b523024b0ce9cc894248d14d2

Score
10/10

Malware Config

Targets

    • Target

      figures 07.21.doc

    • Size

      55KB

    • MD5

      9a412628585242c2fd670a1f014c829c

    • SHA1

      cebe9944eb0920f40328328882825b35705db4ea

    • SHA256

      a500778d298b461bfcb674459951cf37d64c32cc036617c3fe1fcea153bbf1f4

    • SHA512

      c877996419988d0a3dd3f23053cbb3d6e7d51c90cd2568dd58d5a0a734ace283b6a3fdf1c3e1c8cb9d67b09d2183ba92d330a03b523024b0ce9cc894248d14d2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks