General

  • Target

    2023-15-New Order.xls

  • Size

    1.3MB

  • Sample

    230116-tzsygahg87

  • MD5

    eaf38d5a0ede9ff90f43092b8d6fa438

  • SHA1

    3974b0262d8955cc30af49a70dc244c3b737c005

  • SHA256

    ace2708a36fc8a360c22c2fe5ab8a9f54b142bc2fb719b021063a7068847ed37

  • SHA512

    9a04d13c0f8a45428c06afd96bc5e979a796b0178f25e2be32e8d2a87172d925df42ac65777e33294f423a791ca79c78f7934a6d41de44546758311efb44c9ab

  • SSDEEP

    24576:SZyHSmo4mxpfg4mzaipu5HdEdkbiyGvSRBXXXXXXXXXXXXUXXXXXXXXXXXXXXXXw:cBdmWuFkPSzXHAPb

Score
10/10

Malware Config

Targets

    • Target

      2023-15-New Order.xls

    • Size

      1.3MB

    • MD5

      eaf38d5a0ede9ff90f43092b8d6fa438

    • SHA1

      3974b0262d8955cc30af49a70dc244c3b737c005

    • SHA256

      ace2708a36fc8a360c22c2fe5ab8a9f54b142bc2fb719b021063a7068847ed37

    • SHA512

      9a04d13c0f8a45428c06afd96bc5e979a796b0178f25e2be32e8d2a87172d925df42ac65777e33294f423a791ca79c78f7934a6d41de44546758311efb44c9ab

    • SSDEEP

      24576:SZyHSmo4mxpfg4mzaipu5HdEdkbiyGvSRBXXXXXXXXXXXXUXXXXXXXXXXXXXXXXw:cBdmWuFkPSzXHAPb

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks