General
-
Target
Information.xlsb
-
Size
20KB
-
Sample
201113-72m4k28fbs
-
MD5
4dddb0320eac6050d6360c92c104d05c
-
SHA1
816db7af62de3dc200b88357a5341c6ce184cc93
-
SHA256
ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f
-
SHA512
b177b5faa839aeead6c9c732b0182b928903dd34e02d968b95cd93b2f3f01c3b72043c9dafcb6a96a9d1eeb67e4e12abaf537f7ac32b3d166d7f82914844881d
Static task
static1
Behavioral task
behavioral1
Sample
Information.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Information.xlsb
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Information.xlsb
-
Size
20KB
-
MD5
4dddb0320eac6050d6360c92c104d05c
-
SHA1
816db7af62de3dc200b88357a5341c6ce184cc93
-
SHA256
ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f
-
SHA512
b177b5faa839aeead6c9c732b0182b928903dd34e02d968b95cd93b2f3f01c3b72043c9dafcb6a96a9d1eeb67e4e12abaf537f7ac32b3d166d7f82914844881d
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-
Drops file in System32 directory
-