General
-
Target
Invoice_273.xlsm
-
Size
164KB
-
Sample
210421-dktf44rgx2
-
MD5
599ce087cc5f550db5e6af6133b6be19
-
SHA1
4025f5bfe38452647ce0796e3820960702d90b41
-
SHA256
fe3d4647da281e7f5063094c332b3896cff4a1a4d021d1c00295e674ae7a7be9
-
SHA512
78ac9fa93e78f03bf0c027640de08ab763d3a12dc0ff33ada9987b8ccb0f719652148f245af44701625f66564c06272781e96118fbc933ce04d42d906ebbd786
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_273.xlsm
Resource
win7v20210410
Malware Config
Targets
-
-
Target
Invoice_273.xlsm
-
Size
164KB
-
MD5
599ce087cc5f550db5e6af6133b6be19
-
SHA1
4025f5bfe38452647ce0796e3820960702d90b41
-
SHA256
fe3d4647da281e7f5063094c332b3896cff4a1a4d021d1c00295e674ae7a7be9
-
SHA512
78ac9fa93e78f03bf0c027640de08ab763d3a12dc0ff33ada9987b8ccb0f719652148f245af44701625f66564c06272781e96118fbc933ce04d42d906ebbd786
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-