General
-
Target
prochollow.doc
-
Size
143KB
-
Sample
200317-pt9rcrh1l2
-
MD5
b107f3235057bb2b06283030be8f26e4
-
SHA1
b12d2984830eee5ef668032cc13691706efce4a5
-
SHA256
5d077b1341a6472f02aac89488976d4395a91ae4f23657b0344da74f4a560c8d
-
SHA512
b7cb31da8be04e044b3c8aadaf00555277fe990cbc42a81d718812b849be153ba6a87227d37374a6ea3cc3de2a204a749e9b643d8a7c1f39a29aa7beb913b3b8
Static task
static1
Behavioral task
behavioral1
Sample
prochollow.doc
Resource
win7v200217
Behavioral task
behavioral2
Sample
prochollow.doc
Resource
win10v200217
Malware Config
Targets
-
-
Target
prochollow.doc
-
Size
143KB
-
MD5
b107f3235057bb2b06283030be8f26e4
-
SHA1
b12d2984830eee5ef668032cc13691706efce4a5
-
SHA256
5d077b1341a6472f02aac89488976d4395a91ae4f23657b0344da74f4a560c8d
-
SHA512
b7cb31da8be04e044b3c8aadaf00555277fe990cbc42a81d718812b849be153ba6a87227d37374a6ea3cc3de2a204a749e9b643d8a7c1f39a29aa7beb913b3b8
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
Suspicious use of SetThreadContext
-