General

  • Target

    adjure.010.21.21.doc

  • Size

    34KB

  • Sample

    211022-p87qrsbfd5

  • MD5

    4f2dda35a63d6c4d724019d36195a4f9

  • SHA1

    83222019ce517eaa50641763b755f449023b756e

  • SHA256

    7d8378bb87f881c44968a65568fb5165de3ae90afe59a67ef25c5f6af694787d

  • SHA512

    fc01d362ef1b5825cf78aca1c276a1b3e5246ee4464233c78462afabe72b68c299d73b3c5a2363fa6ae08e26265573e63eb0d5f4ff874f086faf40988b9ca2a7

Score
10/10

Malware Config

Targets

    • Target

      adjure.010.21.21.doc

    • Size

      34KB

    • MD5

      4f2dda35a63d6c4d724019d36195a4f9

    • SHA1

      83222019ce517eaa50641763b755f449023b756e

    • SHA256

      7d8378bb87f881c44968a65568fb5165de3ae90afe59a67ef25c5f6af694787d

    • SHA512

      fc01d362ef1b5825cf78aca1c276a1b3e5246ee4464233c78462afabe72b68c299d73b3c5a2363fa6ae08e26265573e63eb0d5f4ff874f086faf40988b9ca2a7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks