General
-
Target
mal.doc
-
Size
63KB
-
Sample
210113-m1cmwhx8ls
-
MD5
7b5f1c01980faf7801f16a761cb8d377
-
SHA1
ee47206c87482de1915b1e441a23a5b3473697e3
-
SHA256
3c59ad7c4426e8396369f084c35a2bd3f0caa3ba1d1a91794153507210a77c90
-
SHA512
26172fb0bbe1b3fc46fedd7a50eeba589134bb9feeb503271c52eec9ec973131b0cfd0a343232dd9f72552fe48dcd70244be416f80237cf9e5773766355e412a
Static task
static1
Behavioral task
behavioral1
Sample
mal.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
mal.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
mal.doc
-
Size
63KB
-
MD5
7b5f1c01980faf7801f16a761cb8d377
-
SHA1
ee47206c87482de1915b1e441a23a5b3473697e3
-
SHA256
3c59ad7c4426e8396369f084c35a2bd3f0caa3ba1d1a91794153507210a77c90
-
SHA512
26172fb0bbe1b3fc46fedd7a50eeba589134bb9feeb503271c52eec9ec973131b0cfd0a343232dd9f72552fe48dcd70244be416f80237cf9e5773766355e412a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-