General

  • Target

    Purchase_Order-216547855891.xls

  • Size

    189KB

  • Sample

    230112-wkcdaaha49

  • MD5

    608efce3d667ddbeca3a26d34cdb955d

  • SHA1

    ee50dcf5e3a2339916c452c44532318aee439116

  • SHA256

    6349065f0a7eeaf2ca85aa8650ce639ee80054a1189c2c0677dd7ccbe34050e1

  • SHA512

    a511211df9b8311bd9dd608da35f9dcfb3791b66f97098ca8452375ec6f905bc2fa8f94a018aad95a6c1b627d5545c7158419fe79f46f69a05679256fddf9b37

  • SSDEEP

    3072:G+YnSGTyFRchUXmdand4NhZFGzEld8AbrCOMxJFeVNQZgcGIe7+a7oPMTuTgc7BF:onSGTyFRchUXmdand4NhZF+Eld8AbrCe

Malware Config

Targets

    • Target

      Purchase_Order-216547855891.xls

    • Size

      189KB

    • MD5

      608efce3d667ddbeca3a26d34cdb955d

    • SHA1

      ee50dcf5e3a2339916c452c44532318aee439116

    • SHA256

      6349065f0a7eeaf2ca85aa8650ce639ee80054a1189c2c0677dd7ccbe34050e1

    • SHA512

      a511211df9b8311bd9dd608da35f9dcfb3791b66f97098ca8452375ec6f905bc2fa8f94a018aad95a6c1b627d5545c7158419fe79f46f69a05679256fddf9b37

    • SSDEEP

      3072:G+YnSGTyFRchUXmdand4NhZFGzEld8AbrCOMxJFeVNQZgcGIe7+a7oPMTuTgc7BF:onSGTyFRchUXmdand4NhZF+Eld8AbrCe

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks