Resubmissions

04-11-2024 10:50

241104-mxgdbsyfmh 10

04-11-2024 10:46

241104-mvgajszamq 8

General

  • Target

    RFQ_PO_091232.doc

  • Size

    825KB

  • Sample

    241104-mvgajszamq

  • MD5

    666036634de5de5ff28819cec19299f3

  • SHA1

    4cb3fb08d6a173e1526f48d1d4237c29f9a49f5f

  • SHA256

    ff221c26a6ad233a179ede24b8156649e2e4338af867571943a2f114650bffa2

  • SHA512

    6f8ede92bcc457c2bc07f3ad15a33799d288b4eb6d56f1b8b44517c36373d35a4fe1e4804e90f5069ccfa400731cd172997ac23a154cbf3640fe5da355fb8eac

  • SSDEEP

    6144:HcwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAjjFkYwsQ+jGnThT:2

Score
8/10

Malware Config

Targets

    • Target

      RFQ_PO_091232.doc

    • Size

      825KB

    • MD5

      666036634de5de5ff28819cec19299f3

    • SHA1

      4cb3fb08d6a173e1526f48d1d4237c29f9a49f5f

    • SHA256

      ff221c26a6ad233a179ede24b8156649e2e4338af867571943a2f114650bffa2

    • SHA512

      6f8ede92bcc457c2bc07f3ad15a33799d288b4eb6d56f1b8b44517c36373d35a4fe1e4804e90f5069ccfa400731cd172997ac23a154cbf3640fe5da355fb8eac

    • SSDEEP

      6144:HcwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAjjFkYwsQ+jGnThT:2

    Score
    8/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks