General

  • Target

    bad.doc

  • Size

    71KB

  • Sample

    240509-r9fd1sfd7x

  • MD5

    c8cf329159df0a375269f965aa181019

  • SHA1

    c3f91d8cbac1083694922a9cf74c3cca27572372

  • SHA256

    55b4b2b98e0d66e97dd11c53fc65cd29ad0ba3c0cca5582a57720855471e771a

  • SHA512

    17aa78dacb7fe249b96685b3b277f41880e401e8e667edfed47db42e0cdf62f5f15baa5866c1bef7f9dfef2a532619e5db3eff0496dee6f556da98eadd796f1c

  • SSDEEP

    1536:tGuuTw8yn40XSDKwGAttaYAseT4MbhgUnlBcYdqcXSYlSufgVHqxHj8tJ14xQq:tGuu08U40XSDKwtttjAseT4MbhgUnlBr

Score
10/10

Malware Config

Targets

    • Target

      bad.doc

    • Size

      71KB

    • MD5

      c8cf329159df0a375269f965aa181019

    • SHA1

      c3f91d8cbac1083694922a9cf74c3cca27572372

    • SHA256

      55b4b2b98e0d66e97dd11c53fc65cd29ad0ba3c0cca5582a57720855471e771a

    • SHA512

      17aa78dacb7fe249b96685b3b277f41880e401e8e667edfed47db42e0cdf62f5f15baa5866c1bef7f9dfef2a532619e5db3eff0496dee6f556da98eadd796f1c

    • SSDEEP

      1536:tGuuTw8yn40XSDKwGAttaYAseT4MbhgUnlBcYdqcXSYlSufgVHqxHj8tJ14xQq:tGuu08U40XSDKwtttjAseT4MbhgUnlBr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks