General

  • Target

    documents-010.21.doc

  • Size

    34KB

  • Sample

    211021-vj4wgabdfl

  • MD5

    45b351e528729b2497285224a2cba401

  • SHA1

    49cca34a6d2338c575cd82e9eff6984f388e50a9

  • SHA256

    0e412a3579154b025a22360faf38aac50ddb3b02d1b71e0293588f341306593a

  • SHA512

    3a1e4032e37850250213a61911f4229eb33defc5f508bbfa71fd9cc794bfa47c86bc121acd8acddf241d8d6dfc07819ee73f7bfa151d6e5f1886c1cba2f19be8

Score
10/10

Malware Config

Targets

    • Target

      documents-010.21.doc

    • Size

      34KB

    • MD5

      45b351e528729b2497285224a2cba401

    • SHA1

      49cca34a6d2338c575cd82e9eff6984f388e50a9

    • SHA256

      0e412a3579154b025a22360faf38aac50ddb3b02d1b71e0293588f341306593a

    • SHA512

      3a1e4032e37850250213a61911f4229eb33defc5f508bbfa71fd9cc794bfa47c86bc121acd8acddf241d8d6dfc07819ee73f7bfa151d6e5f1886c1cba2f19be8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks