General

  • Target

    official paper 07.31.2020_9.doc

  • Size

    113KB

  • Sample

    200731-rfr87gkc7n

  • MD5

    cf663c1b43e3c83e48329b85196bfbf3

  • SHA1

    dfa4c03ba0c8b4bfcd6abc4538226b72529104c4

  • SHA256

    78ae284dc89a379d49cc75a275595f5cfa3c65faeeceb6b4109b8cd7348ae548

  • SHA512

    f9fab227f6acd1507781b4e8ce610c0a5dcb1ce1e79333369e965b88394f9611fe122f9558376dc63274db2146b01ba3e2c417439c4c3047de0b9687b9c51084

Score
10/10

Malware Config

Targets

    • Target

      official paper 07.31.2020_9.doc

    • Size

      113KB

    • MD5

      cf663c1b43e3c83e48329b85196bfbf3

    • SHA1

      dfa4c03ba0c8b4bfcd6abc4538226b72529104c4

    • SHA256

      78ae284dc89a379d49cc75a275595f5cfa3c65faeeceb6b4109b8cd7348ae548

    • SHA512

      f9fab227f6acd1507781b4e8ce610c0a5dcb1ce1e79333369e965b88394f9611fe122f9558376dc63274db2146b01ba3e2c417439c4c3047de0b9687b9c51084

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Tasks