General

  • Target

    Order.xls

  • Size

    31KB

  • Sample

    230125-zdkmvsaf99

  • MD5

    3518e0ea1d12fb7270840ccf51ea7e12

  • SHA1

    e90eaadc59e9c50c0d8a263ad3f5b919c4cf9105

  • SHA256

    6301c7185aeb51cc2bf3eb5840b1af2a6491dc9447628e7b371e8639a62bf64f

  • SHA512

    19c2f93daed38927a0ab2040e355dbc5f222c9e8ebe961b87c858ec6e65b8bf4731fea6a670173631b5359972d0806162e9aed1a28a70f3252396f8e2c6fe6f2

  • SSDEEP

    768:WUck3hOdsylKlgryzc4bNhZFGzE+cL2knAJ6OiCsJdjcrwQ70LSijx:sk3hOdsylKlgryzc4bNhZFGzE+cL2knB

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://filebin.net/ivlin4meff64uwk7/nodeffender.exe

Targets

    • Target

      Order.xls

    • Size

      31KB

    • MD5

      3518e0ea1d12fb7270840ccf51ea7e12

    • SHA1

      e90eaadc59e9c50c0d8a263ad3f5b919c4cf9105

    • SHA256

      6301c7185aeb51cc2bf3eb5840b1af2a6491dc9447628e7b371e8639a62bf64f

    • SHA512

      19c2f93daed38927a0ab2040e355dbc5f222c9e8ebe961b87c858ec6e65b8bf4731fea6a670173631b5359972d0806162e9aed1a28a70f3252396f8e2c6fe6f2

    • SSDEEP

      768:WUck3hOdsylKlgryzc4bNhZFGzE+cL2knAJ6OiCsJdjcrwQ70LSijx:sk3hOdsylKlgryzc4bNhZFGzE+cL2knB

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks