General

  • Target

    ORDER Drawing.docx

  • Size

    10KB

  • Sample

    230219-p8zp6afa4z

  • MD5

    dec384b87057660e59602bc70e4adcc7

  • SHA1

    647e94a7681794eba315c1a4922646cdf917cacf

  • SHA256

    e96f9afe4fc9cade85f120db0e6405fd531a74d648418986a60e6fc88b5dfd72

  • SHA512

    a59cd5d15feb029d41f7fc05499535eb9b62dffb8c99d8714c0ff0c91c33ce443560b5b152eb233337bbaac039a913670f388a5f05f19b6ce4d92157d682d9af

  • SSDEEP

    192:ScIMmtP5hG/b7XN+eOPO+5+5F7Jar/YEChI3rZ:SPXRE7XtOP7wtar/YECOF

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://dgdfgh000000fjfg00000hfghfghgfh00000000fghfgsdgfg000000000gdfgdfgertd00000000fgdfg00000dfg@1739019557/g.doc

Targets

    • Target

      ORDER Drawing.docx

    • Size

      10KB

    • MD5

      dec384b87057660e59602bc70e4adcc7

    • SHA1

      647e94a7681794eba315c1a4922646cdf917cacf

    • SHA256

      e96f9afe4fc9cade85f120db0e6405fd531a74d648418986a60e6fc88b5dfd72

    • SHA512

      a59cd5d15feb029d41f7fc05499535eb9b62dffb8c99d8714c0ff0c91c33ce443560b5b152eb233337bbaac039a913670f388a5f05f19b6ce4d92157d682d9af

    • SSDEEP

      192:ScIMmtP5hG/b7XN+eOPO+5+5F7Jar/YEChI3rZ:SPXRE7XtOP7wtar/YECOF

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks