General

  • Target

    suddenlink.doc.08.11.22.doc

  • Size

    2.2MB

  • Sample

    220811-s4rqjahadq

  • MD5

    13f0a9bd5a2a4fd90924a953eb9b1642

  • SHA1

    bb6d3ab2c01d3058964cd6493a691ad9971307ca

  • SHA256

    04042893124fdbf007cfdb673ef878ac9a47f37f871c1e5322ec46945915abc1

  • SHA512

    4a5d5d80a802886231ff33a37f2bb5e319aee424fe965e69638e77491680543885514bd314e633e2be51475b5585705b0ed1d111bc4dd612d94e82f7a725fc9b

Score
10/10

Malware Config

Targets

    • Target

      suddenlink.doc.08.11.22.doc

    • Size

      2.2MB

    • MD5

      13f0a9bd5a2a4fd90924a953eb9b1642

    • SHA1

      bb6d3ab2c01d3058964cd6493a691ad9971307ca

    • SHA256

      04042893124fdbf007cfdb673ef878ac9a47f37f871c1e5322ec46945915abc1

    • SHA512

      4a5d5d80a802886231ff33a37f2bb5e319aee424fe965e69638e77491680543885514bd314e633e2be51475b5585705b0ed1d111bc4dd612d94e82f7a725fc9b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks