General

  • Target

    SecureMessage.doc

  • Size

    82KB

  • Sample

    211013-skl1yaeccj

  • MD5

    b6bf42a76eb8cea70cb0a9ba2b8f31d5

  • SHA1

    fc27036fefb683e218140e1f0af78f23d711a866

  • SHA256

    3d808601a47c9ae6c1c121a5eb3297ebb8a75f3663cc425f92fc541b90c8200e

  • SHA512

    8c0d9633420537bc3c8c16114959fd9648a31f7ca1fab536a67cd0ca6acb039769f9b0a4845679f32616dcbf16e1efbe6bbed9a53be43dc35cf5a06017e847e0

Malware Config

Targets

    • Target

      SecureMessage.doc

    • Size

      82KB

    • MD5

      b6bf42a76eb8cea70cb0a9ba2b8f31d5

    • SHA1

      fc27036fefb683e218140e1f0af78f23d711a866

    • SHA256

      3d808601a47c9ae6c1c121a5eb3297ebb8a75f3663cc425f92fc541b90c8200e

    • SHA512

      8c0d9633420537bc3c8c16114959fd9648a31f7ca1fab536a67cd0ca6acb039769f9b0a4845679f32616dcbf16e1efbe6bbed9a53be43dc35cf5a06017e847e0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

BITS Jobs

1
T1197

Defense Evasion

BITS Jobs

1
T1197

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks