General
-
Target
rule_12.09.2020.doc
-
Size
90KB
-
Sample
201210-nlegtwdnqs
-
MD5
8ac8cf4ede5bb1df296c8933b31ba1a2
-
SHA1
b7392463d4f63bd4e1fab371a44a4d1a3a9a04d6
-
SHA256
827fb38b70c105c9b5c7855942a787e057a26b51ba63b20410eba23f3ed59545
-
SHA512
0f01020f3b7c9cf288a3ebc015b20d5405e976ce95c18f64f2c6aec8614690ffb83eb92b11152994bd236eb5681a26cf9ff0e62f84420cb6d69c5ea0b5300a1b
Static task
static1
Behavioral task
behavioral1
Sample
rule_12.09.2020.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
rule_12.09.2020.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
rule_12.09.2020.doc
-
Size
90KB
-
MD5
8ac8cf4ede5bb1df296c8933b31ba1a2
-
SHA1
b7392463d4f63bd4e1fab371a44a4d1a3a9a04d6
-
SHA256
827fb38b70c105c9b5c7855942a787e057a26b51ba63b20410eba23f3ed59545
-
SHA512
0f01020f3b7c9cf288a3ebc015b20d5405e976ce95c18f64f2c6aec8614690ffb83eb92b11152994bd236eb5681a26cf9ff0e62f84420cb6d69c5ea0b5300a1b
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-