General

  • Target

    cnewton doc 08.11.2022.doc

  • Size

    2.2MB

  • Sample

    220811-st6rpsbbd5

  • MD5

    ee1d6eb5b07b99e65fc0cb477193c35c

  • SHA1

    9d4dbf701c8ede93a79036dd5a0316da988a2eeb

  • SHA256

    23b9a20a59041fc7d484957e49ffa7e0f6dba7dbbec0628a4adb69c2e05863ab

  • SHA512

    869cdd01eb85cd12a1a27dc0099250e4fb33b3ed72a7e0375e80206b07b01aaff108ede1626de99f29c9a7cbc7524a4e4947b976be2e392b2d777c8df1fc54fc

Score
10/10

Malware Config

Targets

    • Target

      cnewton doc 08.11.2022.doc

    • Size

      2.2MB

    • MD5

      ee1d6eb5b07b99e65fc0cb477193c35c

    • SHA1

      9d4dbf701c8ede93a79036dd5a0316da988a2eeb

    • SHA256

      23b9a20a59041fc7d484957e49ffa7e0f6dba7dbbec0628a4adb69c2e05863ab

    • SHA512

      869cdd01eb85cd12a1a27dc0099250e4fb33b3ed72a7e0375e80206b07b01aaff108ede1626de99f29c9a7cbc7524a4e4947b976be2e392b2d777c8df1fc54fc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks