General

  • Target

    BOM_431780_23.11.22 - Placements.xls

  • Size

    1.0MB

  • Sample

    221123-qxzfpaab6y

  • MD5

    58e7c1683df36fe4dddfc8d130fdaa1e

  • SHA1

    f5d764177528466ab54cbd62a63ddfddf45a15b9

  • SHA256

    85d6b555ded7367b59e072d50f1b0188f1bf462dec4df03e660d5c8b915597e4

  • SHA512

    b2f602df2fc632f7da9e84a1298c4631690b33727e03c1a69248dee5c5582bbe9199bf1c7caad7b851d2bfc27de8ade2d9ce6c46403426ea4bc6ee1dfe30afa8

  • SSDEEP

    24576:rr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXX0mHr5XXXXXXXXXXXXUXXXXXXXSXXXXXZ:XPT

Score
8/10

Malware Config

Targets

    • Target

      BOM_431780_23.11.22 - Placements.xls

    • Size

      1.0MB

    • MD5

      58e7c1683df36fe4dddfc8d130fdaa1e

    • SHA1

      f5d764177528466ab54cbd62a63ddfddf45a15b9

    • SHA256

      85d6b555ded7367b59e072d50f1b0188f1bf462dec4df03e660d5c8b915597e4

    • SHA512

      b2f602df2fc632f7da9e84a1298c4631690b33727e03c1a69248dee5c5582bbe9199bf1c7caad7b851d2bfc27de8ade2d9ce6c46403426ea4bc6ee1dfe30afa8

    • SSDEEP

      24576:rr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXX0mHr5XXXXXXXXXXXXUXXXXXXXSXXXXXZ:XPT

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks