General

  • Target

    direct 010.21.doc

  • Size

    34KB

  • Sample

    211021-s37qcsbdbk

  • MD5

    cbfc543998fd4a558517ae61338c48f3

  • SHA1

    779894322ce9ce5fded2aca4ad8717f8aea63ea3

  • SHA256

    0b5450047f5d2d2a2710902083aba25bd1999e9378fab3e885a90586c8f274e9

  • SHA512

    bf0a8a2cc66c4ba467b598bd97f5d4c110443757b6541e4773f07ace795005a5abc517c0ddeb6d99976e1a800181d7bf5ac327e2ad0315542b7845bcb44898f6

Score
10/10

Malware Config

Targets

    • Target

      direct 010.21.doc

    • Size

      34KB

    • MD5

      cbfc543998fd4a558517ae61338c48f3

    • SHA1

      779894322ce9ce5fded2aca4ad8717f8aea63ea3

    • SHA256

      0b5450047f5d2d2a2710902083aba25bd1999e9378fab3e885a90586c8f274e9

    • SHA512

      bf0a8a2cc66c4ba467b598bd97f5d4c110443757b6541e4773f07ace795005a5abc517c0ddeb6d99976e1a800181d7bf5ac327e2ad0315542b7845bcb44898f6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks