General

  • Target

    Invoice- 098765 Oil_Field.doc

  • Size

    55KB

  • Sample

    211014-mcjb7aghd6

  • MD5

    8a29b9010eae426089e59eab57bcd1de

  • SHA1

    96b75aafab14b177b758d5735f84881f43698c6e

  • SHA256

    0b402031b8fe72ed0557559cc41a4b36cbdcdc55dcc015e966aabdb4af8a2fd6

  • SHA512

    fa754009bc1118cca669755aab803f5ceda44845fb3956c5da6c18258e1eb527e2d027e6fb9a3390aad376bb1f0419d6039aab21ca1f5c9261bd6f82e514dff5

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://secure01wa.2waky.com/a/eApp2.exe

Targets

    • Target

      Invoice- 098765 Oil_Field.doc

    • Size

      55KB

    • MD5

      8a29b9010eae426089e59eab57bcd1de

    • SHA1

      96b75aafab14b177b758d5735f84881f43698c6e

    • SHA256

      0b402031b8fe72ed0557559cc41a4b36cbdcdc55dcc015e966aabdb4af8a2fd6

    • SHA512

      fa754009bc1118cca669755aab803f5ceda44845fb3956c5da6c18258e1eb527e2d027e6fb9a3390aad376bb1f0419d6039aab21ca1f5c9261bd6f82e514dff5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks