General
-
Target
document-1473590378.xls
-
Size
331KB
-
Sample
201126-2yysg6krta
-
MD5
bb1bbf6b86eb3455f3f8ff428b8be07c
-
SHA1
06f20b138a1c9ee9ed08a67c15dca167c2e4deea
-
SHA256
8bd976c027bbc71ef08914ed9710202bb4ecd0394aff95b5312a936e029d3fb6
-
SHA512
ac5d6a49617227005f65fc7eaf2265ff66940d672d872cba7f6e8d6f2aeba2eb9945ef0e2e482f34eabf0df63a21a02cc8a5e5d6bb822aba7d49cc3b560277b8
Static task
static1
Behavioral task
behavioral1
Sample
document-1473590378.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1473590378.xls
Resource
win10v20201028
Malware Config
Targets
-
-
Target
document-1473590378.xls
-
Size
331KB
-
MD5
bb1bbf6b86eb3455f3f8ff428b8be07c
-
SHA1
06f20b138a1c9ee9ed08a67c15dca167c2e4deea
-
SHA256
8bd976c027bbc71ef08914ed9710202bb4ecd0394aff95b5312a936e029d3fb6
-
SHA512
ac5d6a49617227005f65fc7eaf2265ff66940d672d872cba7f6e8d6f2aeba2eb9945ef0e2e482f34eabf0df63a21a02cc8a5e5d6bb822aba7d49cc3b560277b8
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-