General

  • Target

    Invoice-IOMVP.xlsb

  • Size

    315KB

  • Sample

    211013-tlya2aedfn

  • MD5

    2cab816d158d5e2d84fab6d37b377c92

  • SHA1

    581824c7553ad46aae4db994f80ea375d2273664

  • SHA256

    d7105039328f0029cddf86ed266c29a4aab078fb5f04506b95922466f709a513

  • SHA512

    9b6a23bec6dd7945dd4d6ffd0ab00656d5b7c54dee79946d2cf969cb3f715a228697763699e15c9302d44333c6a44549452fb415dba405bad0dee9aa61635059

Score
10/10

Malware Config

Targets

    • Target

      Invoice-IOMVP.xlsb

    • Size

      315KB

    • MD5

      2cab816d158d5e2d84fab6d37b377c92

    • SHA1

      581824c7553ad46aae4db994f80ea375d2273664

    • SHA256

      d7105039328f0029cddf86ed266c29a4aab078fb5f04506b95922466f709a513

    • SHA512

      9b6a23bec6dd7945dd4d6ffd0ab00656d5b7c54dee79946d2cf969cb3f715a228697763699e15c9302d44333c6a44549452fb415dba405bad0dee9aa61635059

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks