General

  • Target

    PAYMENT_ADVICE_2210008WF.xls

  • Size

    123KB

  • Sample

    220811-gyrb2adhc3

  • MD5

    7eeb6c4c06e2b7f1b61dcbcc5ed1cf2f

  • SHA1

    77d637d3c716cbc95626efb9483bc9e39d34e765

  • SHA256

    4f3eca65d342de5bb3f92364f8639d1c492d450cdeff7e69583a198e3ade465c

  • SHA512

    7983cc21f3203999f315c6ea1ebf30e47903624fb830aaf253234d69f62212134c3bc4cbd2ebe6ba55ea4df91680522b4019142ca3612dcb3b5a76681642cc0f

Score
10/10

Malware Config

Targets

    • Target

      PAYMENT_ADVICE_2210008WF.xls

    • Size

      123KB

    • MD5

      7eeb6c4c06e2b7f1b61dcbcc5ed1cf2f

    • SHA1

      77d637d3c716cbc95626efb9483bc9e39d34e765

    • SHA256

      4f3eca65d342de5bb3f92364f8639d1c492d450cdeff7e69583a198e3ade465c

    • SHA512

      7983cc21f3203999f315c6ea1ebf30e47903624fb830aaf253234d69f62212134c3bc4cbd2ebe6ba55ea4df91680522b4019142ca3612dcb3b5a76681642cc0f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks