General

  • Target

    1e342367.docx

  • Size

    10KB

  • Sample

    221123-tbjpwsgf51

  • MD5

    9eefb8db584c11ca27ba0330b4139b24

  • SHA1

    c90afcf05e26a2eb46aece4c26743b8ebf0f53f9

  • SHA256

    1e34236791ab7803d6f5fb1328c09498620f1dfd07bb05de3ca786365c3f0098

  • SHA512

    b16a014114bee8a91256cef3400d1248025327f6c07e05aeaea2cc9082c1651a556b229ffe0cc2a9a00ef8471129dcc8ac61b1e8e29a8942c5cd810b95fceb83

  • SSDEEP

    192:ScIMmtPqCJuEG/bBLgOqDhz2ru5JhBH3OR:SPXyJTJgOqgaJrq

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://00000000000000000000000000000000@392133372/_________________________________________/$$$$$$$$$$$$$_@@@.doc

Targets

    • Target

      1e342367.docx

    • Size

      10KB

    • MD5

      9eefb8db584c11ca27ba0330b4139b24

    • SHA1

      c90afcf05e26a2eb46aece4c26743b8ebf0f53f9

    • SHA256

      1e34236791ab7803d6f5fb1328c09498620f1dfd07bb05de3ca786365c3f0098

    • SHA512

      b16a014114bee8a91256cef3400d1248025327f6c07e05aeaea2cc9082c1651a556b229ffe0cc2a9a00ef8471129dcc8ac61b1e8e29a8942c5cd810b95fceb83

    • SSDEEP

      192:ScIMmtPqCJuEG/bBLgOqDhz2ru5JhBH3OR:SPXyJTJgOqgaJrq

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks