General
-
Target
require 12.20.doc
-
Size
94KB
-
Sample
201215-sjczsqxxh2
-
MD5
b3218a9b099653d0ebc1db27aa505fc5
-
SHA1
74a58b762eb0dd09e0b0cd310a21e05406b1e731
-
SHA256
999e7814917b82aa383ba96826af8ea3dca9d9e5fb67c04cc042b1ebf060e83f
-
SHA512
af650b58058375418e8f8cf97617c341c119bdf440a76881fa3720303f9fd820b96987de0f48e654544a95aea0ac86a63fa4587d9e2f60e069e945a6757cc8da
Static task
static1
Behavioral task
behavioral1
Sample
require 12.20.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
require 12.20.doc
-
Size
94KB
-
MD5
b3218a9b099653d0ebc1db27aa505fc5
-
SHA1
74a58b762eb0dd09e0b0cd310a21e05406b1e731
-
SHA256
999e7814917b82aa383ba96826af8ea3dca9d9e5fb67c04cc042b1ebf060e83f
-
SHA512
af650b58058375418e8f8cf97617c341c119bdf440a76881fa3720303f9fd820b96987de0f48e654544a95aea0ac86a63fa4587d9e2f60e069e945a6757cc8da
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-