General
-
Target
document-1496831930.xls
-
Size
331KB
-
Sample
201126-nybw2crmp6
-
MD5
7b67ef658abdd27562f707a687abe6a5
-
SHA1
5ecf5c64f9ee1b4a0db0e69a0b4c655d84fa74ad
-
SHA256
bb853d9410a75278ae40e2e177f4ae00ae986b8a0f51641e192b5e8dda40961e
-
SHA512
4b5332321eaab9c66132abc221b759343fb0f9e2d71120cc0a333ca4031dfe8f054c3a100ad4f7a052859fbec63b8e0140e933d3577fd079a564f345251c951e
Static task
static1
Behavioral task
behavioral1
Sample
document-1496831930.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1496831930.xls
Resource
win10v20201028
Malware Config
Targets
-
-
Target
document-1496831930.xls
-
Size
331KB
-
MD5
7b67ef658abdd27562f707a687abe6a5
-
SHA1
5ecf5c64f9ee1b4a0db0e69a0b4c655d84fa74ad
-
SHA256
bb853d9410a75278ae40e2e177f4ae00ae986b8a0f51641e192b5e8dda40961e
-
SHA512
4b5332321eaab9c66132abc221b759343fb0f9e2d71120cc0a333ca4031dfe8f054c3a100ad4f7a052859fbec63b8e0140e933d3577fd079a564f345251c951e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-