General

  • Target

    Packing List.xlsx

  • Size

    441KB

  • Sample

    211029-jyvesshfcm

  • MD5

    44e50536f1d63ee7db4228446f5ae99f

  • SHA1

    c40de858890f7297e50b0b2dd0644dbb482b7055

  • SHA256

    c0945280218aa1fd2ed370b1331f7393d2b2313e27be7bfd523017dd324a10be

  • SHA512

    4d730408febd3f9cd5d50d944303ee85b7d3fda20181d861665445d14be700050538226b3c207c0e6d4d75b1be016d0d8e6c3c2db368afcabf9759b784f0072d

Score
10/10

Malware Config

Targets

    • Target

      Packing List.xlsx

    • Size

      441KB

    • MD5

      44e50536f1d63ee7db4228446f5ae99f

    • SHA1

      c40de858890f7297e50b0b2dd0644dbb482b7055

    • SHA256

      c0945280218aa1fd2ed370b1331f7393d2b2313e27be7bfd523017dd324a10be

    • SHA512

      4d730408febd3f9cd5d50d944303ee85b7d3fda20181d861665445d14be700050538226b3c207c0e6d4d75b1be016d0d8e6c3c2db368afcabf9759b784f0072d

    Score
    10/10
    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks