General

  • Target

    actionplan doc 08.11.doc

  • Size

    2.2MB

  • Sample

    220811-tdb3tsbeb4

  • MD5

    933338ca2c25cfda5c124455216d6709

  • SHA1

    e518d12b7bb4addf1dc041a05575031890c1b4d7

  • SHA256

    abc8d1097f0249c749f2c7d7058be1b39c88e21d26d45d76985c989289565214

  • SHA512

    57d89f7b2319e6725bc72e06b3e00b13b4e23445a723bb84fc3d0d199b8546b7e30de68c4b90a3244aaad7b974c3e6bbe8695ab0cacac8aef18ccceae3c741c5

Score
10/10

Malware Config

Targets

    • Target

      actionplan doc 08.11.doc

    • Size

      2.2MB

    • MD5

      933338ca2c25cfda5c124455216d6709

    • SHA1

      e518d12b7bb4addf1dc041a05575031890c1b4d7

    • SHA256

      abc8d1097f0249c749f2c7d7058be1b39c88e21d26d45d76985c989289565214

    • SHA512

      57d89f7b2319e6725bc72e06b3e00b13b4e23445a723bb84fc3d0d199b8546b7e30de68c4b90a3244aaad7b974c3e6bbe8695ab0cacac8aef18ccceae3c741c5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks