General

  • Target

    bad.xlsm

  • Size

    117KB

  • Sample

    210726-aq28ygk3gs

  • MD5

    b0447301a0386548cb74bbc6d0136d75

  • SHA1

    bb96a1d7a1191e0bf908c73a2096b6f56d970443

  • SHA256

    d0420e4b533266c8238a6d6cacdd911f8e638c2d793452fe1a647ee8ee5cfdb7

  • SHA512

    798f304664acfa909511277402b1fb9d31a08db799b8950ca216bbb5a540b73c0d8a96d2c9887688358961b40fb0752c83a88832b6b340a13059dabd3a850213

Score
10/10

Malware Config

Targets

    • Target

      bad.xlsm

    • Size

      117KB

    • MD5

      b0447301a0386548cb74bbc6d0136d75

    • SHA1

      bb96a1d7a1191e0bf908c73a2096b6f56d970443

    • SHA256

      d0420e4b533266c8238a6d6cacdd911f8e638c2d793452fe1a647ee8ee5cfdb7

    • SHA512

      798f304664acfa909511277402b1fb9d31a08db799b8950ca216bbb5a540b73c0d8a96d2c9887688358961b40fb0752c83a88832b6b340a13059dabd3a850213

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks