General
-
Target
4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146.doc
-
Size
189KB
-
Sample
200717-p7w47c31n6
-
MD5
8bf215ddf97dbb3635ecb087c99232b7
-
SHA1
7abc4f8c0a5d3aa88daec11feb3f8b4febb85099
-
SHA256
4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146
-
SHA512
60afec4843c3f92076798f87cae0f19941fd92d2bfc272d36fa7f003e6685dabaf772c8dc71837af50be6a3d3c61407e3f263036cb2d52a6d0ac57871d49dab9
Static task
static1
Behavioral task
behavioral1
Sample
4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146.doc
Resource
win7
Malware Config
Targets
-
-
Target
4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146.doc
-
Size
189KB
-
MD5
8bf215ddf97dbb3635ecb087c99232b7
-
SHA1
7abc4f8c0a5d3aa88daec11feb3f8b4febb85099
-
SHA256
4ed066613a591eec3099e8e184eca3cd7d5c6ac1db55c09f61fd9e2d60b7a146
-
SHA512
60afec4843c3f92076798f87cae0f19941fd92d2bfc272d36fa7f003e6685dabaf772c8dc71837af50be6a3d3c61407e3f263036cb2d52a6d0ac57871d49dab9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-