General

  • Target

    document-1367992196.xls

  • Size

    331KB

  • Sample

    201126-ce29zgwzga

  • MD5

    1d9ec88725c31bc97045ff4a78318d63

  • SHA1

    2d45a61c6245b2440381c79992ee30cde3417479

  • SHA256

    ec12e927e193005a827df630e66929e18666f48a5c2466af0a5720a7ccc242cb

  • SHA512

    673c8d1962fd00546e56e47670516215a0635efb3cc72a42ea012f1837acd6d9ffcdb927d6a348db2215573f51a4df8a32d648e16c2840864ed83f13486c232a

Score
10/10

Malware Config

Targets

    • Target

      document-1367992196.xls

    • Size

      331KB

    • MD5

      1d9ec88725c31bc97045ff4a78318d63

    • SHA1

      2d45a61c6245b2440381c79992ee30cde3417479

    • SHA256

      ec12e927e193005a827df630e66929e18666f48a5c2466af0a5720a7ccc242cb

    • SHA512

      673c8d1962fd00546e56e47670516215a0635efb3cc72a42ea012f1837acd6d9ffcdb927d6a348db2215573f51a4df8a32d648e16c2840864ed83f13486c232a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks