General
-
Target
msoffice_invoice1764727.doc
-
Size
97KB
-
Sample
200803-gexmw79xys
-
MD5
5d38f68c18e3d9557523b25ad3fe4a86
-
SHA1
a2c736b4bb06131dbb828c79711a1c7ec729d501
-
SHA256
eef4b50a6a9a4371bc70b9b79d033053f0419c8c216118a6b5046117e4d6e272
-
SHA512
4a6dcba8e2563f09dda60ac52dcda7f93e699f254a745d04ebbec57564e37371470e9d41473c2e33ad11256dea9f7a811810aeab1263a203048058c83a3f73f9
Static task
static1
Behavioral task
behavioral1
Sample
msoffice_invoice1764727.doc
Resource
win7v200722
Behavioral task
behavioral2
Sample
msoffice_invoice1764727.doc
Resource
win10
Malware Config
Extracted
http://185.189.12.182/RLCOrLHeK.com
http://185.189.12.182/FfvEZtUVUkHjw.com
http://185.189.12.182/GUavFcvTh.com
Targets
-
-
Target
msoffice_invoice1764727.doc
-
Size
97KB
-
MD5
5d38f68c18e3d9557523b25ad3fe4a86
-
SHA1
a2c736b4bb06131dbb828c79711a1c7ec729d501
-
SHA256
eef4b50a6a9a4371bc70b9b79d033053f0419c8c216118a6b5046117e4d6e272
-
SHA512
4a6dcba8e2563f09dda60ac52dcda7f93e699f254a745d04ebbec57564e37371470e9d41473c2e33ad11256dea9f7a811810aeab1263a203048058c83a3f73f9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-