General

  • Target

    Purchase Inquiry_pdf.ppt

  • Size

    26KB

  • Sample

    210915-ha8f3shhh9

  • MD5

    42c6c6e05ac8066594a8caf9dac49943

  • SHA1

    c83f30ff485b3ca6a8d4068c398aeb2d7368f14f

  • SHA256

    26dd67c14738a6c47e2eab3cf7eae088640d406617c4630bdd0f402369cd7184

  • SHA512

    15df38db85f11ac6ebc7b9e059efadc63b448102cce5c031bfd6d40592cd1cc3022898332b9adc1496af3dd06bc5bf5c7ff371f7b4113ea1009a54a838ce3d0d

Score
10/10

Malware Config

Targets

    • Target

      Purchase Inquiry_pdf.ppt

    • Size

      26KB

    • MD5

      42c6c6e05ac8066594a8caf9dac49943

    • SHA1

      c83f30ff485b3ca6a8d4068c398aeb2d7368f14f

    • SHA256

      26dd67c14738a6c47e2eab3cf7eae088640d406617c4630bdd0f402369cd7184

    • SHA512

      15df38db85f11ac6ebc7b9e059efadc63b448102cce5c031bfd6d40592cd1cc3022898332b9adc1496af3dd06bc5bf5c7ff371f7b4113ea1009a54a838ce3d0d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks