General

  • Target

    bc0447fc688b291c44911860e59ff06fab7477582ff9998dc9c387312057fb4c

  • Size

    318KB

  • Sample

    221203-pw2nzsbc46

  • MD5

    7ecd89d2e320d578b77efd0de9049c93

  • SHA1

    2147226db39d6060cb88e14677a79452f6a78927

  • SHA256

    bc0447fc688b291c44911860e59ff06fab7477582ff9998dc9c387312057fb4c

  • SHA512

    897b9f3f28c81b7caf614f3f06cf0805feb7f306545b0d20cf0316ef418f82cd6ff9de3aefbc593d8fcb0e41253b420e9ff5cd7f0fb59bd129ccc958d6e9eefe

  • SSDEEP

    6144:TjWMqRr0lMm9kZCTdk3xRWE4N6NL/CrM5FVoPfmq9WfaPXPyHMsy:1ywUCBkBRmrM5FGPfNGO

Malware Config

Targets

    • Target

      bc0447fc688b291c44911860e59ff06fab7477582ff9998dc9c387312057fb4c

    • Size

      318KB

    • MD5

      7ecd89d2e320d578b77efd0de9049c93

    • SHA1

      2147226db39d6060cb88e14677a79452f6a78927

    • SHA256

      bc0447fc688b291c44911860e59ff06fab7477582ff9998dc9c387312057fb4c

    • SHA512

      897b9f3f28c81b7caf614f3f06cf0805feb7f306545b0d20cf0316ef418f82cd6ff9de3aefbc593d8fcb0e41253b420e9ff5cd7f0fb59bd129ccc958d6e9eefe

    • SSDEEP

      6144:TjWMqRr0lMm9kZCTdk3xRWE4N6NL/CrM5FVoPfmq9WfaPXPyHMsy:1ywUCBkBRmrM5FGPfNGO

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks