General
-
Target
46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99.doc
-
Size
188KB
-
Sample
200717-r8mawxtc9e
-
MD5
d4a1b3cb3c3382875666f25a1050d2b3
-
SHA1
a86cc878084f4b651c82bb4c89b3b97381c53775
-
SHA256
46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99
-
SHA512
6d54d63dd8531940817f947421391672892310718ac4a727465e00a8532cea3717cb5132bac47df20161b9f8c6c70163e35267fdf80aafafe92440eadc778f43
Static task
static1
Behavioral task
behavioral1
Sample
46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99.doc
Resource
win7v200430
Malware Config
Targets
-
-
Target
46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99.doc
-
Size
188KB
-
MD5
d4a1b3cb3c3382875666f25a1050d2b3
-
SHA1
a86cc878084f4b651c82bb4c89b3b97381c53775
-
SHA256
46a1bc126658ca3de121d07c778420ffd99ddd9ce2271922902e888d8a038f99
-
SHA512
6d54d63dd8531940817f947421391672892310718ac4a727465e00a8532cea3717cb5132bac47df20161b9f8c6c70163e35267fdf80aafafe92440eadc778f43
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-