General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.21545
-
Size
311KB
-
Sample
200713-hnwc4et6p6
-
MD5
780c65f9799fabd4b736165bc5785eeb
-
SHA1
0a510a166031402b2ca98be6c406a9e8914afb43
-
SHA256
dc999f91abf8dc03db424fb8bed91876c06cafa4da8d1d303595328361be9d26
-
SHA512
f5721b5353929f231822b9d367e28b6c865b66f93e373cddd23079bdfb2faa1049282c5ec4adfe988a1c8f3992033f3db74665d633915de7336ba9178f83a977
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.21545.xls
Resource
win7v200430
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.21545.xls
Resource
win10
Malware Config
Targets
-
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.21545
-
Size
311KB
-
MD5
780c65f9799fabd4b736165bc5785eeb
-
SHA1
0a510a166031402b2ca98be6c406a9e8914afb43
-
SHA256
dc999f91abf8dc03db424fb8bed91876c06cafa4da8d1d303595328361be9d26
-
SHA512
f5721b5353929f231822b9d367e28b6c865b66f93e373cddd23079bdfb2faa1049282c5ec4adfe988a1c8f3992033f3db74665d633915de7336ba9178f83a977
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Enumerates connected drives
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-