General
-
Target
document-1474276477.xls
-
Size
331KB
-
Sample
201126-zl6ce1mnda
-
MD5
4e2fdd2ad6ea93c4f0c4e8ebad7c384c
-
SHA1
110fbc21311390df65f15f1daecf026eb9ba7084
-
SHA256
fc6ab80fbc053cf7f436c12c50ea7689fe7d7a777bb1c7b5a6a95a6d69aeebad
-
SHA512
5aa82c59728fe51fb7eb7257cead644911dbc66b14f9df2fccd711fa93d17b56105b92d225e690744d01bb6986d161aa4faf056070cf2fc889a9afa68ac5055c
Static task
static1
Behavioral task
behavioral1
Sample
document-1474276477.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1474276477.xls
Resource
win10v20201028
Malware Config
Targets
-
-
Target
document-1474276477.xls
-
Size
331KB
-
MD5
4e2fdd2ad6ea93c4f0c4e8ebad7c384c
-
SHA1
110fbc21311390df65f15f1daecf026eb9ba7084
-
SHA256
fc6ab80fbc053cf7f436c12c50ea7689fe7d7a777bb1c7b5a6a95a6d69aeebad
-
SHA512
5aa82c59728fe51fb7eb7257cead644911dbc66b14f9df2fccd711fa93d17b56105b92d225e690744d01bb6986d161aa4faf056070cf2fc889a9afa68ac5055c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-