General

  • Target

    PO 17265 SCB.xlsx

  • Size

    2.0MB

  • Sample

    240508-gnzweseb4v

  • MD5

    272a0766164131b5cd9b1b2948ac9cf1

  • SHA1

    b26064a6b37caba89186a80273920120752d5e1f

  • SHA256

    93f5f2d4ff775373e7154402ba6adf105ce6693f2b6fa0cb5db3e03fb4ac1657

  • SHA512

    b467fa31df3fe1f4b05d9ed9d3a367b2aa1077a0a31471d352c4afba1358593b3f6c697bd4fd96f6a2fc077844211ca313bb82c634492255a594d679e714c91a

  • SSDEEP

    49152:ucIsFFXdV0iAdTw7Zqm/So5C13+i3oK5zgZVdY:u1aFrwdEv/S13oAx

Score
10/10

Malware Config

Targets

    • Target

      PO 17265 SCB.xlsx

    • Size

      2.0MB

    • MD5

      272a0766164131b5cd9b1b2948ac9cf1

    • SHA1

      b26064a6b37caba89186a80273920120752d5e1f

    • SHA256

      93f5f2d4ff775373e7154402ba6adf105ce6693f2b6fa0cb5db3e03fb4ac1657

    • SHA512

      b467fa31df3fe1f4b05d9ed9d3a367b2aa1077a0a31471d352c4afba1358593b3f6c697bd4fd96f6a2fc077844211ca313bb82c634492255a594d679e714c91a

    • SSDEEP

      49152:ucIsFFXdV0iAdTw7Zqm/So5C13+i3oK5zgZVdY:u1aFrwdEv/S13oAx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks