General

  • Target

    6988a0aa635c18ecdcba1e5d5adf79d97b7724ee531bdb3497d7fa7294a7455b.zip

  • Size

    175KB

  • Sample

    220726-vcz9psehf4

  • MD5

    7fd5240c83b2da5b0080a4388e8f044c

  • SHA1

    eb8fa5fb917c08fa0824533f9f54193f41602eee

  • SHA256

    30bbfc2671b6741debfe9a469c2587e8ecc90197daf44e86f84bbcfa969abe4e

  • SHA512

    6e103964162053fe9d7902e8288c5c723ae2491522631bfe9781e2a4efbe0442f7406939a41ab125c3781be9d23d5fcf269f92f178c0c93182229cff618fdbf4

Malware Config

Targets

    • Target

      6988a0aa635c18ecdcba1e5d5adf79d97b7724ee531bdb3497d7fa7294a7455b.xlsx

    • Size

      181KB

    • MD5

      29e34f6ac4428d885814569fde955321

    • SHA1

      acb427f920b588403c088dee736ec4084c9cd948

    • SHA256

      6988a0aa635c18ecdcba1e5d5adf79d97b7724ee531bdb3497d7fa7294a7455b

    • SHA512

      55259390b41e3d09076910bb61ead7fea192e3a3cc7f53c32513b306d71045d50e5936701743d42795f4d4d35cdb2926861571c4ebb639ec8bed55602df64f55

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks