General
-
Target
enjoin,12.15.2020.doc
-
Size
95KB
-
Sample
201215-y2ncn7yjje
-
MD5
833181d6dc9faf97302fe055e4d70799
-
SHA1
0ce9dabffe93625a44751507355b719806d81d2b
-
SHA256
47220270d007200cdf76e9867245320ead29976e15ab5e164d9babe8ac04bea0
-
SHA512
a4f30b2203751528b4c3577549235de15d81c39b31f58825ee5117220d6d3fd7e7478c6c33ff7a0e3cf5495b2fd0a1bff611dbf4f086849f9a1c4dc3cc610de2
Static task
static1
Behavioral task
behavioral1
Sample
enjoin,12.15.2020.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
enjoin,12.15.2020.doc
-
Size
95KB
-
MD5
833181d6dc9faf97302fe055e4d70799
-
SHA1
0ce9dabffe93625a44751507355b719806d81d2b
-
SHA256
47220270d007200cdf76e9867245320ead29976e15ab5e164d9babe8ac04bea0
-
SHA512
a4f30b2203751528b4c3577549235de15d81c39b31f58825ee5117220d6d3fd7e7478c6c33ff7a0e3cf5495b2fd0a1bff611dbf4f086849f9a1c4dc3cc610de2
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-