General
-
Target
document-1479658044.xls
-
Size
331KB
-
Sample
201126-sfw9ey9aea
-
MD5
6cdb43f669589f8247a2afbedd48fe3c
-
SHA1
0f619106fc76ed26d341d6c6dbe346437baa1691
-
SHA256
c748f9f614569bba06b6312585483f2f24f7d2711cc926c8e34ebb8e31e79fde
-
SHA512
b76355c3b4fdad9d033a4d975aafddb1307ec72ba913955c58e610b5b02e526d6441b38e2d4d80f0f1f8ed7a0e0b8cee0b7746f700dae507844a150ffd00df06
Static task
static1
Behavioral task
behavioral1
Sample
document-1479658044.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1479658044.xls
Resource
win10v20201028
Malware Config
Targets
-
-
Target
document-1479658044.xls
-
Size
331KB
-
MD5
6cdb43f669589f8247a2afbedd48fe3c
-
SHA1
0f619106fc76ed26d341d6c6dbe346437baa1691
-
SHA256
c748f9f614569bba06b6312585483f2f24f7d2711cc926c8e34ebb8e31e79fde
-
SHA512
b76355c3b4fdad9d033a4d975aafddb1307ec72ba913955c58e610b5b02e526d6441b38e2d4d80f0f1f8ed7a0e0b8cee0b7746f700dae507844a150ffd00df06
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-