General

  • Target

    Invoice-3045_20211013.xlsb

  • Size

    215KB

  • Sample

    211018-slr9caegdn

  • MD5

    4705fb956a9c848adbdf5c3d063f99d6

  • SHA1

    0c2f1960bb73813fd47c074712b4cce7f78a6674

  • SHA256

    072576f21e0a485894421eb56b434213582b7d1080acc298a6dcf41d52f7af14

  • SHA512

    7c6453bcd4a22c9de6aa6d1b50c6a7b09e370e5ad108226e39cba0f3ca86a3341d462b1602698a7fd867b7f084c883ec467614d3249c07fe8dbd3892935677af

Score
10/10

Malware Config

Targets

    • Target

      Invoice-3045_20211013.xlsb

    • Size

      215KB

    • MD5

      4705fb956a9c848adbdf5c3d063f99d6

    • SHA1

      0c2f1960bb73813fd47c074712b4cce7f78a6674

    • SHA256

      072576f21e0a485894421eb56b434213582b7d1080acc298a6dcf41d52f7af14

    • SHA512

      7c6453bcd4a22c9de6aa6d1b50c6a7b09e370e5ad108226e39cba0f3ca86a3341d462b1602698a7fd867b7f084c883ec467614d3249c07fe8dbd3892935677af

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks