General

  • Target

    fc05cd8da82316228f909a821ffdb61136d56740c116cbbb04ccaef015a218a0

  • Size

    99KB

  • Sample

    220521-edxxzaccfm

  • MD5

    9fd1548f08ce068c009f700a35d57c9b

  • SHA1

    2b137f3200cae1cad782040d146f6cfa9e643637

  • SHA256

    fc05cd8da82316228f909a821ffdb61136d56740c116cbbb04ccaef015a218a0

  • SHA512

    ebdd019b273b6ae4e4c667d3490127b9eb3951c867e2679763fd08cc243f18f6691101f837050b84acca50e60e4d8a481c43fdf5fae88f832904d8d2f3c1d25d

Score
10/10

Malware Config

Targets

    • Target

      Order.xlsm

    • Size

      143KB

    • MD5

      5628587a1bc8cc65ef2d1c7283319eaf

    • SHA1

      2aea79b0b48861b2edbebe7180d7b5506f951d56

    • SHA256

      74f28a4dad71ce2a455d4ad77fe50105b72b2357c2f34cd96b877498b35838cb

    • SHA512

      6e7da7bf9514c57d369629d5ba826a77b4caacca0a9ad8c981ecedabab34a63df19d973ec665205b74dd60c1831feacffaf3a28f78faa8af444aae6acc8a3d86

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks