General
-
Target
Invoice #535576.xlsm
-
Size
161KB
-
Sample
210421-pd29bffx96
-
MD5
c02eba6c5cb189c3dfd85199b785077b
-
SHA1
7b1c517e64a46840a9da597496325a30ab7f42a1
-
SHA256
3bd55c9e2fdcd1b707612af00bcc75f5e11640d9d9952ddf3a68d107f27f9102
-
SHA512
d3d88facce07bc5bb573ec6cb895e40220c5dca9e36437aaf19739fd6ec6c38473cee8c2a82ec0ee411404e6b9e62c68d2cc2761346087c41d1dca524e0809bb
Static task
static1
Behavioral task
behavioral1
Sample
Invoice #535576.xlsm
Resource
win7v20210410
Malware Config
Targets
-
-
Target
Invoice #535576.xlsm
-
Size
161KB
-
MD5
c02eba6c5cb189c3dfd85199b785077b
-
SHA1
7b1c517e64a46840a9da597496325a30ab7f42a1
-
SHA256
3bd55c9e2fdcd1b707612af00bcc75f5e11640d9d9952ddf3a68d107f27f9102
-
SHA512
d3d88facce07bc5bb573ec6cb895e40220c5dca9e36437aaf19739fd6ec6c38473cee8c2a82ec0ee411404e6b9e62c68d2cc2761346087c41d1dca524e0809bb
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-