General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.6586
-
Size
300KB
-
Sample
200713-jwql7my442
-
MD5
ee4e4354a83b4f83ce02d43d3d62f605
-
SHA1
91c416665c0d3265ce241e745a146f5c2ea8b7ba
-
SHA256
37bae39cdd152ba0ad9c8661f7fa2740fd23c5d4f4666a560d11a0100da100e7
-
SHA512
8630fe21d22767606897aa501e9e1368178f63a0ccb566b2707b1d864dc1083de4d24e398291b99b00884559b8fcaa24f1b85b16709302f23dac40aadcb864e0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.6586.xls
Resource
win7v200430
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.6586.xls
Resource
win10
Malware Config
Targets
-
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.6586
-
Size
300KB
-
MD5
ee4e4354a83b4f83ce02d43d3d62f605
-
SHA1
91c416665c0d3265ce241e745a146f5c2ea8b7ba
-
SHA256
37bae39cdd152ba0ad9c8661f7fa2740fd23c5d4f4666a560d11a0100da100e7
-
SHA512
8630fe21d22767606897aa501e9e1368178f63a0ccb566b2707b1d864dc1083de4d24e398291b99b00884559b8fcaa24f1b85b16709302f23dac40aadcb864e0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Enumerates connected drives
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-