General
-
Target
document-1440220447.xls
-
Size
332KB
-
Sample
201126-vtrylmnqh6
-
MD5
052b07d30b79ee820afaf3fe7152ce15
-
SHA1
676b96303fcd3391f872e493c7230a6eb4ec68eb
-
SHA256
4834f7d5ccb25c4b4771bd6de3e0af6e17c1a2552b7555f3384782a1b254097f
-
SHA512
80ccfdf77e30cdf9b80e224b5d5261a39b2e26b2180fbec24c7c52634208c88fc61a8e8ad74e20db301e0407fb7a1a78b6e96928517802a9074ebbc06cda8b2a
Static task
static1
Behavioral task
behavioral1
Sample
document-1440220447.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1440220447.xls
Resource
win10v20201028
Malware Config
Targets
-
-
Target
document-1440220447.xls
-
Size
332KB
-
MD5
052b07d30b79ee820afaf3fe7152ce15
-
SHA1
676b96303fcd3391f872e493c7230a6eb4ec68eb
-
SHA256
4834f7d5ccb25c4b4771bd6de3e0af6e17c1a2552b7555f3384782a1b254097f
-
SHA512
80ccfdf77e30cdf9b80e224b5d5261a39b2e26b2180fbec24c7c52634208c88fc61a8e8ad74e20db301e0407fb7a1a78b6e96928517802a9074ebbc06cda8b2a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-