General

  • Target

    dictate-010.21.doc

  • Size

    34KB

  • Sample

    211021-w4t3fabeel

  • MD5

    27c6e3a95419811dade0a91336ed78ba

  • SHA1

    1cb11df53cb076607bb6c3aac65c9efd7238e5c0

  • SHA256

    aa8f2b060e929883fab4209f54d43b5c7ac75d98926180a61c13eca889cddeb3

  • SHA512

    d83ff89f2a06d0ee3913bad17262cf0bcacdc9a1147592458e7ba79dc63a9a592ea5d1e12c3c96d15d55bfe435eb015a12a019c0114a318733d5508ca3f8f0c9

Score
10/10

Malware Config

Targets

    • Target

      dictate-010.21.doc

    • Size

      34KB

    • MD5

      27c6e3a95419811dade0a91336ed78ba

    • SHA1

      1cb11df53cb076607bb6c3aac65c9efd7238e5c0

    • SHA256

      aa8f2b060e929883fab4209f54d43b5c7ac75d98926180a61c13eca889cddeb3

    • SHA512

      d83ff89f2a06d0ee3913bad17262cf0bcacdc9a1147592458e7ba79dc63a9a592ea5d1e12c3c96d15d55bfe435eb015a12a019c0114a318733d5508ca3f8f0c9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks