General
-
Target
Fattura_25785.xlsm
-
Size
28KB
-
Sample
201124-yxw8znrnfe
-
MD5
f72f88ebdf048fdfedf0aa3e298d9e71
-
SHA1
b8ea58415338bed65d4cd194ead6ac663ad71a6c
-
SHA256
78ccf25ecee02f759cefa6b1c29a00fb4ce64c000f7b9c04c1fc08e04d04bc1b
-
SHA512
0c6d96fcda11df417cfd48d51753d5a6334d80df04b3709ccbfc8a2d5d073822ad606da49e99c724a9d5bd16a98a623f2f9f3a2cbfe2b01bc668f44991db2903
Static task
static1
Behavioral task
behavioral1
Sample
Fattura_25785.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Fattura_25785.xlsm
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Fattura_25785.xlsm
-
Size
28KB
-
MD5
f72f88ebdf048fdfedf0aa3e298d9e71
-
SHA1
b8ea58415338bed65d4cd194ead6ac663ad71a6c
-
SHA256
78ccf25ecee02f759cefa6b1c29a00fb4ce64c000f7b9c04c1fc08e04d04bc1b
-
SHA512
0c6d96fcda11df417cfd48d51753d5a6334d80df04b3709ccbfc8a2d5d073822ad606da49e99c724a9d5bd16a98a623f2f9f3a2cbfe2b01bc668f44991db2903
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-