General
-
Target
DOCUMENTS.xls
-
Size
80KB
-
Sample
201214-ldehvj1ycs
-
MD5
bfa6b801f26f67cc2231d4191a2486e5
-
SHA1
d6c3fe24036c6b402eeb80e065a11280aa236625
-
SHA256
076c11df218d9fd86a809bb3e3b4a9c2211caad31e630d731d64592bee49eec4
-
SHA512
b06a89f9606533c9c7c6c0884c76c7e59919e1b66425e7e7f97d11bb2faafea80ed379c056c440269f3c6b132c297ea90172f54f893600747609d67a1202367b
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENTS.xls
Resource
win10v20201028
Malware Config
Extracted
https://tinyurl.com/y6fpv3lj
Targets
-
-
Target
DOCUMENTS.xls
-
Size
80KB
-
MD5
bfa6b801f26f67cc2231d4191a2486e5
-
SHA1
d6c3fe24036c6b402eeb80e065a11280aa236625
-
SHA256
076c11df218d9fd86a809bb3e3b4a9c2211caad31e630d731d64592bee49eec4
-
SHA512
b06a89f9606533c9c7c6c0884c76c7e59919e1b66425e7e7f97d11bb2faafea80ed379c056c440269f3c6b132c297ea90172f54f893600747609d67a1202367b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes itself
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation