General

  • Target

    berniesbooksdocument08.11.doc

  • Size

    2.2MB

  • Sample

    220811-tgr88abef2

  • MD5

    2b10f2617b32857999df1cf5f19f0d8d

  • SHA1

    448e513536aa0c576b123d5b243e1bdc6d261d6f

  • SHA256

    3b86f8aff12d2b32461a0b20f01f3d13ee062c80cb647ce09ff33f296b1f9e47

  • SHA512

    f99a1ffdb12b9fe4bc512f33ef98fa989312951fdbfc6aa8cc09d0725cbb90e2c11727dced788991e00087859054b273f09917d2fa3b52cd5be54ecd257dd85c

Score
10/10

Malware Config

Targets

    • Target

      berniesbooksdocument08.11.doc

    • Size

      2.2MB

    • MD5

      2b10f2617b32857999df1cf5f19f0d8d

    • SHA1

      448e513536aa0c576b123d5b243e1bdc6d261d6f

    • SHA256

      3b86f8aff12d2b32461a0b20f01f3d13ee062c80cb647ce09ff33f296b1f9e47

    • SHA512

      f99a1ffdb12b9fe4bc512f33ef98fa989312951fdbfc6aa8cc09d0725cbb90e2c11727dced788991e00087859054b273f09917d2fa3b52cd5be54ecd257dd85c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks