General

  • Target

    document-1572967389.xls

  • Size

    331KB

  • Sample

    201126-2kw81hhhkj

  • MD5

    c5d923bd2a92f66d8288bf0f022e10f5

  • SHA1

    211f5b35d72b9f7e6ccd38c6bfb1fb7689b09891

  • SHA256

    e91f494145c5d3a2cb05ad17aa88b4af678564f01457662219da66bd7ab03742

  • SHA512

    d88ba37679cda520f58bd069bd690ebdaa4b075baa0a344c64f64efd9f70532cd9eb1a02b302e0548cccaf9509e0086ce998f504545eab80274036ff4b6a961a

Score
10/10

Malware Config

Targets

    • Target

      document-1572967389.xls

    • Size

      331KB

    • MD5

      c5d923bd2a92f66d8288bf0f022e10f5

    • SHA1

      211f5b35d72b9f7e6ccd38c6bfb1fb7689b09891

    • SHA256

      e91f494145c5d3a2cb05ad17aa88b4af678564f01457662219da66bd7ab03742

    • SHA512

      d88ba37679cda520f58bd069bd690ebdaa4b075baa0a344c64f64efd9f70532cd9eb1a02b302e0548cccaf9509e0086ce998f504545eab80274036ff4b6a961a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks