General

  • Target

    Payment Advice.xlsx

  • Size

    1.2MB

  • Sample

    210810-h59brf4rpe

  • MD5

    5b73fe85493ab5de9f1fca6386854f66

  • SHA1

    c4ab5b4c915cba9eda255be8a88702aad1aeec81

  • SHA256

    04fe8deb7fcd8197c15970a7bd846c6e12c9108aad2464570fd4342b64190e41

  • SHA512

    34c02b023f17d9c739e12f6c0ee1c33633f528a87c5ede4e9a65e6ab9487d0a4af3d5f1a4ba5366ef2282423832d150cb31547466d08f1f6d869b3627fce33f3

Score
8/10

Malware Config

Targets

    • Target

      Payment Advice.xlsx

    • Size

      1.2MB

    • MD5

      5b73fe85493ab5de9f1fca6386854f66

    • SHA1

      c4ab5b4c915cba9eda255be8a88702aad1aeec81

    • SHA256

      04fe8deb7fcd8197c15970a7bd846c6e12c9108aad2464570fd4342b64190e41

    • SHA512

      34c02b023f17d9c739e12f6c0ee1c33633f528a87c5ede4e9a65e6ab9487d0a4af3d5f1a4ba5366ef2282423832d150cb31547466d08f1f6d869b3627fce33f3

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks