General

  • Target

    Inq_Specs.docx

  • Size

    10KB

  • Sample

    221207-sv1xvafc46

  • MD5

    587b90f5cf6b0776db453f4404022a98

  • SHA1

    7a28e496d7fe980a9d91892a007edde59c2d802c

  • SHA256

    737668f5569e69d5570e2dc3b5a93098a16c5e72cb02d95915603bcc9ce829d7

  • SHA512

    cf8f5a4df6435c30386e979443f6e29976ec1690cd5fcfae0573e68980fe8652eb668feb6e4c3f115aa038627680856bf1f2ac6e0ec487b98aef0dde311e9136

  • SSDEEP

    192:ScIMmtP8ar5G/bfIdTOGnamWBX8ex6y30Wfx:SPXt4ATOGnosMFZ

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://weriireuiutertiuiutertiuiuiertiuerit@1755848840/_______0o0-_0_________00o0_______0oo_______o0o_/weriiuiuetirefdguiertiudfgiiu.doc

Targets

    • Target

      Inq_Specs.docx

    • Size

      10KB

    • MD5

      587b90f5cf6b0776db453f4404022a98

    • SHA1

      7a28e496d7fe980a9d91892a007edde59c2d802c

    • SHA256

      737668f5569e69d5570e2dc3b5a93098a16c5e72cb02d95915603bcc9ce829d7

    • SHA512

      cf8f5a4df6435c30386e979443f6e29976ec1690cd5fcfae0573e68980fe8652eb668feb6e4c3f115aa038627680856bf1f2ac6e0ec487b98aef0dde311e9136

    • SSDEEP

      192:ScIMmtP8ar5G/bfIdTOGnamWBX8ex6y30Wfx:SPXt4ATOGnosMFZ

    Score
    8/10
    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks