General
-
Target
document-1449953935.xls
-
Size
331KB
-
Sample
201126-6cfpwvmjyn
-
MD5
d094d59cc53395b2bde1b79d59045dae
-
SHA1
a98aa224a291e81d31f70508b8420182ed7e6ee0
-
SHA256
4f0b2fc9e36a57d083793960b96ec631ada63ed0d992072ba3ee13681842aa39
-
SHA512
069265decd8bde2c1cd74873fbc9096cc3d25d7c5b4704bdf968d28db9b3780be7ca9c1406cec4bac4b8a05c4bf8b4e48ded66a587498dd156e5d28c61051366
Static task
static1
Behavioral task
behavioral1
Sample
document-1449953935.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1449953935.xls
Resource
win10v20201028
Malware Config
Targets
-
-
Target
document-1449953935.xls
-
Size
331KB
-
MD5
d094d59cc53395b2bde1b79d59045dae
-
SHA1
a98aa224a291e81d31f70508b8420182ed7e6ee0
-
SHA256
4f0b2fc9e36a57d083793960b96ec631ada63ed0d992072ba3ee13681842aa39
-
SHA512
069265decd8bde2c1cd74873fbc9096cc3d25d7c5b4704bdf968d28db9b3780be7ca9c1406cec4bac4b8a05c4bf8b4e48ded66a587498dd156e5d28c61051366
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-