General

  • Target

    ORDER_SHEET_SPEC.zip

  • Size

    67KB

  • Sample

    230326-dg72nsfc86

  • MD5

    93bf58d227852a25c0ad12750ebfea86

  • SHA1

    bfab6abb9c7444ff31dbbcba92fee92daaaa5679

  • SHA256

    22e8e4fb8b26ad737393013f09fdd97aad5e7d69cb7d6a7154ca3c476b920e7c

  • SHA512

    6cc39c534ad5f1802a1a59b7767cb7d14139b70c93da6333374bb5a302e13ce8062c0065db2688b0234059b6dda89a78be045e78d2d59fc0aa97fa6484626525

  • SSDEEP

    1536:fPUnQ+SlGNawF+lG6xzDK4qyq+niREciATBkvJp2WEgcySKeGI/f:fPUnQlUawkE6BDK4qeiWc3BkX2bgcOeZ

Score
10/10

Malware Config

Targets

    • Target

      ORDER SHEET & SPEC.xlsm

    • Size

      2.7MB

    • MD5

      7ccf88c0bbe3b29bf19d877c4596a8d4

    • SHA1

      23f0506d857d38c3cd5354b80afc725b5f034744

    • SHA256

      7bcd31bd41686c32663c7cabf42b18c50399e3b3b4533fc2ff002d9f2e058813

    • SHA512

      0ec8f398d9ab943e2e38a086d87d750eccc081fb73c6357319e79fe9f69e66a5566c00ce6d297d0d5fadaa5c04220dcf4d9adea1e0c1f88f335dc1c63797dfdc

    • SSDEEP

      1536:Hhh3S1cLkPROxXYvoYIZCMMV2ZX0nIcjELcE3E:0cCOxtYIEbsX0n98E

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Tasks