General
-
Target
prescribe -010.20.2020.doc
-
Size
102KB
-
Sample
201020-sh1xgaeml2
-
MD5
21d971c4dae25216e0caf51431072a7a
-
SHA1
e46920935500cdfc1d64597806a0cd9485a8435a
-
SHA256
f5c3bc03dc3e7149e72828e94fbf85d530da390af10bbd73a76ca1e8c9af3c9c
-
SHA512
367645cf23115f631b97585c6583fa185b39d3c6a773ce2a68cc5599a2d8db31c09e5b393161f38573c1d01e6e84203750aa406b536536fed81b9cd98861cb38
Static task
static1
Behavioral task
behavioral1
Sample
prescribe -010.20.2020.doc
Resource
win7
Behavioral task
behavioral2
Sample
prescribe -010.20.2020.doc
Resource
win10
Malware Config
Extracted
icedid
1949629567
Targets
-
-
Target
prescribe -010.20.2020.doc
-
Size
102KB
-
MD5
21d971c4dae25216e0caf51431072a7a
-
SHA1
e46920935500cdfc1d64597806a0cd9485a8435a
-
SHA256
f5c3bc03dc3e7149e72828e94fbf85d530da390af10bbd73a76ca1e8c9af3c9c
-
SHA512
367645cf23115f631b97585c6583fa185b39d3c6a773ce2a68cc5599a2d8db31c09e5b393161f38573c1d01e6e84203750aa406b536536fed81b9cd98861cb38
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation