General

  • Target

    Invoice-0698805_20211013.xlsb

  • Size

    260KB

  • Sample

    211017-yem9psdgap

  • MD5

    5129fb0949ab1f45a5ed8b10660f5ae5

  • SHA1

    80d9bfeab69746016a74c679c09d39232ab0d789

  • SHA256

    d99228052274a877b5b1d7f46af550ccfdfbe4b82464fc0f11a2f7697102a31f

  • SHA512

    b37c06adfdba7a0e734cc51aa730b8f232bb82a5904b521d85e60914df1dbe20f4c7b908c30c4467eb19ac1bb84e16a1c26757302c0e0dbc5aab6b39d010db12

Score
10/10

Malware Config

Targets

    • Target

      Invoice-0698805_20211013.xlsb

    • Size

      260KB

    • MD5

      5129fb0949ab1f45a5ed8b10660f5ae5

    • SHA1

      80d9bfeab69746016a74c679c09d39232ab0d789

    • SHA256

      d99228052274a877b5b1d7f46af550ccfdfbe4b82464fc0f11a2f7697102a31f

    • SHA512

      b37c06adfdba7a0e734cc51aa730b8f232bb82a5904b521d85e60914df1dbe20f4c7b908c30c4467eb19ac1bb84e16a1c26757302c0e0dbc5aab6b39d010db12

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks