General
-
Target
c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9.doc
-
Size
189KB
-
Sample
200717-8zj8x7k4ga
-
MD5
95696b4e1081bd532590948eaac2ea86
-
SHA1
dfe0f7bce39811fbc44e94de70a1230aa2891736
-
SHA256
c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9
-
SHA512
52f9e3b1f23ef405f11256824a712461bc75a31a8e0a9af481d548a7f5e4fadb4253ee2a8f164bfc3f28cb698a7dca706c7ea8e622758ea8d70831ff3ce6f7c2
Static task
static1
Behavioral task
behavioral1
Sample
c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9.doc
Resource
win7v200430
Malware Config
Targets
-
-
Target
c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9.doc
-
Size
189KB
-
MD5
95696b4e1081bd532590948eaac2ea86
-
SHA1
dfe0f7bce39811fbc44e94de70a1230aa2891736
-
SHA256
c56c9ac4ef1e2dbb0bbbdbb9da068f8d66706d8c0111f2f1f2abbc2c96f5eeb9
-
SHA512
52f9e3b1f23ef405f11256824a712461bc75a31a8e0a9af481d548a7f5e4fadb4253ee2a8f164bfc3f28cb698a7dca706c7ea8e622758ea8d70831ff3ce6f7c2
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-