General

  • Target

    296C1D6.xlsm

  • Size

    85KB

  • Sample

    210723-bkpvbx2s2s

  • MD5

    a274a2694daeb06ee3d0e40a24d267fa

  • SHA1

    b19b4d662b7d52cf05329aacae2ea5de58a994c1

  • SHA256

    5b94eba231cfcfba05e835abcac317497a655ef53c1981cfe864e0117ff62a48

  • SHA512

    7f89d7f244cbb94ead225d6e5bdb11460bef45bf2063c6a23dfac81237a4698b25f4edc64b43c76928a75b0266007b5645e5c0893b5b156c5ec6deac77934ff4

Score
10/10

Malware Config

Targets

    • Target

      296C1D6.xlsm

    • Size

      85KB

    • MD5

      a274a2694daeb06ee3d0e40a24d267fa

    • SHA1

      b19b4d662b7d52cf05329aacae2ea5de58a994c1

    • SHA256

      5b94eba231cfcfba05e835abcac317497a655ef53c1981cfe864e0117ff62a48

    • SHA512

      7f89d7f244cbb94ead225d6e5bdb11460bef45bf2063c6a23dfac81237a4698b25f4edc64b43c76928a75b0266007b5645e5c0893b5b156c5ec6deac77934ff4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks