General

  • Target

    B9CD7F34E5260B2002C3B3514C8756E4F211FA5A8CDAD2C107B90131996605E7

  • Size

    10KB

  • Sample

    230208-v2l4dade63

  • MD5

    964435a9422be8e9212752151d6e2045

  • SHA1

    7bf1fa0295f31caca8f93b986e1980764695683b

  • SHA256

    b9cd7f34e5260b2002c3b3514c8756e4f211fa5a8cdad2c107b90131996605e7

  • SHA512

    86e8e259e4244210201502a0da6e7bacd730b9e92f21dc2ab07328a4148bcf9af383610aac0089e431558efe5e7dc32d3775aebdb6a9d509a35dab06f930a2ee

  • SSDEEP

    192:ScIMmtP5hG/b7XN+eOUeO+5+5F7Jar/YEChI3uN:SPXRE7XtOUe7wtar/YECO+

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://dgd0000fghfjf000ghf0000hfghgfhf0000ghfgsdgfgg00000dfgdfgert0000000dfgdfgdfg@3235032958/3.doc

Targets

    • Target

      B9CD7F34E5260B2002C3B3514C8756E4F211FA5A8CDAD2C107B90131996605E7

    • Size

      10KB

    • MD5

      964435a9422be8e9212752151d6e2045

    • SHA1

      7bf1fa0295f31caca8f93b986e1980764695683b

    • SHA256

      b9cd7f34e5260b2002c3b3514c8756e4f211fa5a8cdad2c107b90131996605e7

    • SHA512

      86e8e259e4244210201502a0da6e7bacd730b9e92f21dc2ab07328a4148bcf9af383610aac0089e431558efe5e7dc32d3775aebdb6a9d509a35dab06f930a2ee

    • SSDEEP

      192:ScIMmtP5hG/b7XN+eOUeO+5+5F7Jar/YEChI3uN:SPXRE7XtOUe7wtar/YECO+

    Score
    8/10
    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks