General
-
Target
Documents386.xlsm
-
Size
57KB
-
Sample
210315-4h3tvp6bee
-
MD5
9dbad542b671f4e700258b2c58a9195b
-
SHA1
0a24b5ba33f37c387a9895702959169f4f577bfa
-
SHA256
3d799da3e93bebcb93e74ebf906a4690914aa338538eb7abe5627ff87e455da7
-
SHA512
f50541f6c7059f7a61fe9896b6d0eccfedc34a5b3a81ee7232ea792d0946105c1070785decb54357a3b834a67a3fb37edeab4ab093a474d7a546b0f75b0a5647
Behavioral task
behavioral1
Sample
Documents386.xlsm
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Documents386.xlsm
-
Size
57KB
-
MD5
9dbad542b671f4e700258b2c58a9195b
-
SHA1
0a24b5ba33f37c387a9895702959169f4f577bfa
-
SHA256
3d799da3e93bebcb93e74ebf906a4690914aa338538eb7abe5627ff87e455da7
-
SHA512
f50541f6c7059f7a61fe9896b6d0eccfedc34a5b3a81ee7232ea792d0946105c1070785decb54357a3b834a67a3fb37edeab4ab093a474d7a546b0f75b0a5647
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-