General

  • Target

    figures-07.21.doc

  • Size

    68KB

  • Sample

    210722-vxanr8dbg6

  • MD5

    770a8bde63b2e589403e5ee9f3e4cc1a

  • SHA1

    6e52cb2ffebde22b9a9870a8ea8b4e26922f9f22

  • SHA256

    164f30f3849b54f2e3c1aef75cfc9a9f4c6f39df382656ef3eac9d7d3b1d0f52

  • SHA512

    df95e8d07a4eef860653a9a9ab3272201ccbcba0a67a3ba918880da79df9dbece4ffac7b38ecfca33cf15bb6b2d1a42e93fd9692bbef5af05a40f2664d17e3a3

Score
10/10

Malware Config

Targets

    • Target

      figures-07.21.doc

    • Size

      68KB

    • MD5

      770a8bde63b2e589403e5ee9f3e4cc1a

    • SHA1

      6e52cb2ffebde22b9a9870a8ea8b4e26922f9f22

    • SHA256

      164f30f3849b54f2e3c1aef75cfc9a9f4c6f39df382656ef3eac9d7d3b1d0f52

    • SHA512

      df95e8d07a4eef860653a9a9ab3272201ccbcba0a67a3ba918880da79df9dbece4ffac7b38ecfca33cf15bb6b2d1a42e93fd9692bbef5af05a40f2664d17e3a3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks