General

  • Target

    input.010.21.2021.doc

  • Size

    34KB

  • Sample

    211021-swyh4saeb2

  • MD5

    b9470a968a6edf4b2ce6c52d69610235

  • SHA1

    5219339d196bd7c698f51973c06c1a32370d9f65

  • SHA256

    bdd3eeea2e9c2930f75115dc2bccfef990d6aae5d8b0253c1e0effa0b1911b5b

  • SHA512

    bdbec4af4913e9b87603f3d1c946667782803f32a8d194de4aa9ce7eae0da7c1b16b8bfbc9d467bba1aa5e9a48ff650aaf26c886a2d1c1cb9d7fc5dc732e85ea

Score
10/10

Malware Config

Targets

    • Target

      input.010.21.2021.doc

    • Size

      34KB

    • MD5

      b9470a968a6edf4b2ce6c52d69610235

    • SHA1

      5219339d196bd7c698f51973c06c1a32370d9f65

    • SHA256

      bdd3eeea2e9c2930f75115dc2bccfef990d6aae5d8b0253c1e0effa0b1911b5b

    • SHA512

      bdbec4af4913e9b87603f3d1c946667782803f32a8d194de4aa9ce7eae0da7c1b16b8bfbc9d467bba1aa5e9a48ff650aaf26c886a2d1c1cb9d7fc5dc732e85ea

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks