General

  • Target

    Quotation Copy.xlsm

  • Size

    41KB

  • Sample

    230314-jw61tagd2v

  • MD5

    986255b8b199fd0eb3dbe0ece696fd32

  • SHA1

    fd526537497165a0c780589d7f4b4bfdec7520ce

  • SHA256

    fdc6d2131103090d0829beb0770dac89bd431833cdd347c0aa464f3b56f7f505

  • SHA512

    f608f2044a04f60e8df6c5c866786febc405e69260bc2a84b2616fb984c3524bc491877369ed98e3073e2a478f84d3639e64f3aa777cb4fd897e10dbc34d4a04

  • SSDEEP

    768:RAxtsvPXnqtHiv+nWl8hqBIJYfTH+niSpQ4FFiKk/f9VwRtp+noiW:mwv/qEv+GG1B1FFi3/VVwTMor

Score
10/10

Malware Config

Targets

    • Target

      Quotation Copy.xlsm

    • Size

      41KB

    • MD5

      986255b8b199fd0eb3dbe0ece696fd32

    • SHA1

      fd526537497165a0c780589d7f4b4bfdec7520ce

    • SHA256

      fdc6d2131103090d0829beb0770dac89bd431833cdd347c0aa464f3b56f7f505

    • SHA512

      f608f2044a04f60e8df6c5c866786febc405e69260bc2a84b2616fb984c3524bc491877369ed98e3073e2a478f84d3639e64f3aa777cb4fd897e10dbc34d4a04

    • SSDEEP

      768:RAxtsvPXnqtHiv+nWl8hqBIJYfTH+niSpQ4FFiKk/f9VwRtp+noiW:mwv/qEv+GG1B1FFi3/VVwTMor

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks