General

  • Target

    wpswireless-invoice-08.11.22.doc

  • Size

    2.2MB

  • Sample

    220811-st63gaghbj

  • MD5

    672ff75cfa223733b4d42382089a57b2

  • SHA1

    02dd6b448c2373dc1223724b1ab1aff920528aa6

  • SHA256

    aabc9295e27a673dcfb902960b8196a561923cef78ddb061956cb627fcfa782c

  • SHA512

    67ae70869362e5f55cec2655cbe924387baed91a0104abfb47ead979aac7b56684af5e5413b305ea1fdaeb5ccd7053e7ff398a341dd2fcc7c8b325f05ac2e272

Score
10/10

Malware Config

Targets

    • Target

      wpswireless-invoice-08.11.22.doc

    • Size

      2.2MB

    • MD5

      672ff75cfa223733b4d42382089a57b2

    • SHA1

      02dd6b448c2373dc1223724b1ab1aff920528aa6

    • SHA256

      aabc9295e27a673dcfb902960b8196a561923cef78ddb061956cb627fcfa782c

    • SHA512

      67ae70869362e5f55cec2655cbe924387baed91a0104abfb47ead979aac7b56684af5e5413b305ea1fdaeb5ccd7053e7ff398a341dd2fcc7c8b325f05ac2e272

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks