General

  • Target

    7af7596221989569fd75cd4ede98c88b661a2cb8d8011f52c6a5654a1487fe93

  • Size

    48KB

  • Sample

    220521-d7mtesghh6

  • MD5

    f3406ab209f8610badf05c1d36e6336b

  • SHA1

    4dd919c217d65147e9a8535f6c3cdc3b07f78e08

  • SHA256

    7af7596221989569fd75cd4ede98c88b661a2cb8d8011f52c6a5654a1487fe93

  • SHA512

    335af7a29732c74e071bb0f2e0ad2293b44a88c8e7120b5a7d25827139f9b6c23db6bc28dc6dc5538f90d7ff8e9cf059160949cf6aedc6d03aaf9a3611864bc1

Score
10/10

Malware Config

Targets

    • Target

      7af7596221989569fd75cd4ede98c88b661a2cb8d8011f52c6a5654a1487fe93

    • Size

      48KB

    • MD5

      f3406ab209f8610badf05c1d36e6336b

    • SHA1

      4dd919c217d65147e9a8535f6c3cdc3b07f78e08

    • SHA256

      7af7596221989569fd75cd4ede98c88b661a2cb8d8011f52c6a5654a1487fe93

    • SHA512

      335af7a29732c74e071bb0f2e0ad2293b44a88c8e7120b5a7d25827139f9b6c23db6bc28dc6dc5538f90d7ff8e9cf059160949cf6aedc6d03aaf9a3611864bc1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks