General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.17780
-
Size
295KB
-
Sample
200713-gyctkqpyrs
-
MD5
405bb15c0a415c57b9dab50a6091c9ff
-
SHA1
ac32a14b6e71c6db7947b02554ef82986157c98a
-
SHA256
fd8aec0158da8e2d9e0d3bbc78c9bf73e72613e09bf385d728438a3dd89dd665
-
SHA512
6590a4176a7f934af417ff12ecb39d8806bee8757e50a27a4b6e9a517896461d0536c56956878fb71b61bf216d785a11323a8f1a5ae5afa4f9fb19a6e28fb68e
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.17780.xls
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.17780.xls
Resource
win10v200430
Malware Config
Targets
-
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.17780
-
Size
295KB
-
MD5
405bb15c0a415c57b9dab50a6091c9ff
-
SHA1
ac32a14b6e71c6db7947b02554ef82986157c98a
-
SHA256
fd8aec0158da8e2d9e0d3bbc78c9bf73e72613e09bf385d728438a3dd89dd665
-
SHA512
6590a4176a7f934af417ff12ecb39d8806bee8757e50a27a4b6e9a517896461d0536c56956878fb71b61bf216d785a11323a8f1a5ae5afa4f9fb19a6e28fb68e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Enumerates connected drives
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-