General
-
Target
intelligence.07.20.doc
-
Size
114KB
-
Sample
200715-slx1g9kgsa
-
MD5
31d82f84272d8dfd22f57694faa2cb0b
-
SHA1
73c7451375e7014bcd5f239412a7030428c39f26
-
SHA256
bb9b7bf7e2fdefe4fcb05e44f267239955d6c75db7ebf1d6b9926b8e4b1f3330
-
SHA512
fbd0e09176957868de9a4814ff47c3eb50aa27830c9ca63f08fd7693f946c2387020fbea6acb2b4057712d632162ec27f100c4adbdfbcb8e53ab83a749b4a97e
Static task
static1
Behavioral task
behavioral1
Sample
intelligence.07.20.doc
Resource
win7
Behavioral task
behavioral2
Sample
intelligence.07.20.doc
Resource
win10v200430
Malware Config
Targets
-
-
Target
intelligence.07.20.doc
-
Size
114KB
-
MD5
31d82f84272d8dfd22f57694faa2cb0b
-
SHA1
73c7451375e7014bcd5f239412a7030428c39f26
-
SHA256
bb9b7bf7e2fdefe4fcb05e44f267239955d6c75db7ebf1d6b9926b8e4b1f3330
-
SHA512
fbd0e09176957868de9a4814ff47c3eb50aa27830c9ca63f08fd7693f946c2387020fbea6acb2b4057712d632162ec27f100c4adbdfbcb8e53ab83a749b4a97e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-