General
-
Target
Patent_656419797_as-of-27thJune2020.doc.zip
-
Size
964KB
-
Sample
201120-cx5fwpl1we
-
MD5
f62a1362efee1d9ef7731d4439e46feb
-
SHA1
db74a7834a49612a9cc5e37087757f914cf61fc7
-
SHA256
c3a59ff2bf7e39ce991568f3a1f159dcd10bc1f10312214397b73d2978f3ff9b
-
SHA512
1c717650942e9d9d66ac5cf3833dc569553acd21b28ac566a1cccd72ee5c1cddb5a0268bccef68712a1a84a7165715963c987545b562f3d969c332c45644c8e0
Static task
static1
Behavioral task
behavioral1
Sample
Patent_656419797_as-of-27thJune2020.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Patent_656419797_as-of-27thJune2020.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Patent_656419797_as-of-27thJune2020.doc
-
Size
1006KB
-
MD5
45df50ea19045aa1d48ee962246c8c56
-
SHA1
86d00261ba88265bdd6b27ca76c44e2769c5088e
-
SHA256
cf577313173f345525aff5b7efe4c709507da92a9c9211559f6ff6af00db44b2
-
SHA512
262d148ed613ad6659c9f186537a50c8228182c58616de8b03687389ade4541e2cb829eee99a86b89c69af7e4d854e38813a030b528cb83f1fdefca96beb9bf4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-