General

  • Target

    document-1366980661.xls

  • Size

    331KB

  • Sample

    201126-7cpng6ly4x

  • MD5

    6b7d69df8a9f2b8a528549d2248d2697

  • SHA1

    ad2f2d67e905654624f4734025155153c981425a

  • SHA256

    11bc8e84ba65fe6478e46fcc6b98a7c9e1727c09fa42ec92e7064219013611bf

  • SHA512

    95af642529c502a7323e92b7cf921a1acfea0fad7c3647d2ebf1e6110a3ac6e32df33b102aeb53809a4755211d02259ec0c7ce49fec451dcddb1bb1c4b9cd6ea

Score
10/10

Malware Config

Targets

    • Target

      document-1366980661.xls

    • Size

      331KB

    • MD5

      6b7d69df8a9f2b8a528549d2248d2697

    • SHA1

      ad2f2d67e905654624f4734025155153c981425a

    • SHA256

      11bc8e84ba65fe6478e46fcc6b98a7c9e1727c09fa42ec92e7064219013611bf

    • SHA512

      95af642529c502a7323e92b7cf921a1acfea0fad7c3647d2ebf1e6110a3ac6e32df33b102aeb53809a4755211d02259ec0c7ce49fec451dcddb1bb1c4b9cd6ea

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks