General

  • Target

    7ccf88c0bbe3b29bf19d877c4596a8d4.zip

  • Size

    67KB

  • Sample

    230831-lgwbwaec98

  • MD5

    adee407a5d9f4425707fe5bd4c25aa14

  • SHA1

    5a99f6b3b106daf23ba2c29f2ff94cb118703414

  • SHA256

    a53db45f1d4a2f36ebc0b0e268d2073baba89ca6c1d05fe9a06ef395e8658a51

  • SHA512

    ba5a20cb904c3964e8db737a2814cfaea6497b0b23e5d8f1eef331fede066369f220e93e639b7a741e66ccaa0daf1ee481199c11ef93fd21422622d8dc5c50d3

  • SSDEEP

    1536:jjaEudvK51sOagtBDPihqGGJRvbB8lmAqQap28rxmQ3wIUG7ChXtZlYGdf:jejdvK17JKhqNjv3p2oxzw67CVtZlYi

Score
10/10

Malware Config

Targets

    • Target

      ORDER SHEET & SPEC.xlsm

    • Size

      2.7MB

    • MD5

      7ccf88c0bbe3b29bf19d877c4596a8d4

    • SHA1

      23f0506d857d38c3cd5354b80afc725b5f034744

    • SHA256

      7bcd31bd41686c32663c7cabf42b18c50399e3b3b4533fc2ff002d9f2e058813

    • SHA512

      0ec8f398d9ab943e2e38a086d87d750eccc081fb73c6357319e79fe9f69e66a5566c00ce6d297d0d5fadaa5c04220dcf4d9adea1e0c1f88f335dc1c63797dfdc

    • SSDEEP

      1536:Hhh3S1cLkPROxXYvoYIZCMMV2ZX0nIcjELcE3E:0cCOxtYIEbsX0n98E

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Tasks