General
-
Target
file 07.08.2020.doc
-
Size
147KB
-
Sample
200711-kryaztr8ta
-
MD5
f87de9e54541c53de616b230852e0d28
-
SHA1
9cf0153c3a04a30c138ab649b8a8cb1286c8fd8a
-
SHA256
f9b682245ad0fe442e1bbe331f67b8c6a6241aac9fb2aa727b020a4f0a897ce2
-
SHA512
5652193e9c969fb3150a8e8c2291f8b964f83ef1e3868df579666273b3abb7f56264993ee259a59e866d38f663f158dc9bd1fc046b377abf8bd8b5fe098e99b5
Static task
static1
Behavioral task
behavioral1
Sample
file 07.08.2020.doc
Resource
win7
Behavioral task
behavioral2
Sample
file 07.08.2020.doc
Resource
win10v200430
Malware Config
Targets
-
-
Target
file 07.08.2020.doc
-
Size
147KB
-
MD5
f87de9e54541c53de616b230852e0d28
-
SHA1
9cf0153c3a04a30c138ab649b8a8cb1286c8fd8a
-
SHA256
f9b682245ad0fe442e1bbe331f67b8c6a6241aac9fb2aa727b020a4f0a897ce2
-
SHA512
5652193e9c969fb3150a8e8c2291f8b964f83ef1e3868df579666273b3abb7f56264993ee259a59e866d38f663f158dc9bd1fc046b377abf8bd8b5fe098e99b5
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-