General

  • Target

    document-1496935144.xls

  • Size

    331KB

  • Sample

    201126-e5vm9x528a

  • MD5

    8707e9df26c15acbdff4bed277c786b1

  • SHA1

    17637e971251d059ae213f3345f4c7d2b79c0439

  • SHA256

    acdae74f06fbf4337bb7ebfcca459ccc86d6c08c856a05078bebe169dc273a8a

  • SHA512

    498d73874b4e746e399ac581ab1371d7c63c9383c074c4fe16b5b380ca610c98f2dc08215c82785b2e935c525a0e20038caf24001713d3221e562a29a4049865

Score
10/10

Malware Config

Targets

    • Target

      document-1496935144.xls

    • Size

      331KB

    • MD5

      8707e9df26c15acbdff4bed277c786b1

    • SHA1

      17637e971251d059ae213f3345f4c7d2b79c0439

    • SHA256

      acdae74f06fbf4337bb7ebfcca459ccc86d6c08c856a05078bebe169dc273a8a

    • SHA512

      498d73874b4e746e399ac581ab1371d7c63c9383c074c4fe16b5b380ca610c98f2dc08215c82785b2e935c525a0e20038caf24001713d3221e562a29a4049865

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks