General

  • Target

    New Revised Order.xls

  • Size

    1.0MB

  • Sample

    231005-p88casda92

  • MD5

    cf45025f4545d02a57a155e186be6870

  • SHA1

    28c2bb02a9b9d7b62190c39ddcf4040daff8a78f

  • SHA256

    0a28b42d86dcb53bd70ec3b328a8f40d8e052da8612136a40fec429bdf5434ac

  • SHA512

    b985674a47c5ec9a0a95a7d3d30fbab7ae236d67ac1bc94b4a18d4915130c6f29c51040ffc7130f406b0ead88aaa73eac7e219d294512e45ef1a31d0176bfbe1

  • SSDEEP

    24576:fP8DK69PFoheNZ+zNyGZ+zN2yWdV1ueOhnt5Chk2t5l:gL9NohMZusGZuEyUVcRhnXChk2t5l

Score
10/10

Malware Config

Targets

    • Target

      New Revised Order.xls

    • Size

      1.0MB

    • MD5

      cf45025f4545d02a57a155e186be6870

    • SHA1

      28c2bb02a9b9d7b62190c39ddcf4040daff8a78f

    • SHA256

      0a28b42d86dcb53bd70ec3b328a8f40d8e052da8612136a40fec429bdf5434ac

    • SHA512

      b985674a47c5ec9a0a95a7d3d30fbab7ae236d67ac1bc94b4a18d4915130c6f29c51040ffc7130f406b0ead88aaa73eac7e219d294512e45ef1a31d0176bfbe1

    • SSDEEP

      24576:fP8DK69PFoheNZ+zNyGZ+zN2yWdV1ueOhnt5Chk2t5l:gL9NohMZusGZuEyUVcRhnXChk2t5l

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks