General
-
Target
instrument indenture.05.06.2021.doc
-
Size
79KB
-
Sample
210506-jex7cekcmn
-
MD5
c4b0617006900fdfdd3eaa762c68a8ef
-
SHA1
4ce54af01029c685759fe181dcc80633a0044630
-
SHA256
453e7a4314783ccee4547d5be1f17bd841599bebe9f9f6d8d3ba0b05be7cb059
-
SHA512
242fc7ce5d65647fd920d782d17427dec9e4cdd3e43f001fbb8dd04e35784e94bce2a4a7f7e76f1ebfa4675bdee7f5d426f2be54aa0e2a01781deb20199d0e12
Static task
static1
Behavioral task
behavioral1
Sample
instrument indenture.05.06.2021.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
instrument indenture.05.06.2021.doc
Resource
win10v20210410
Malware Config
Targets
-
-
Target
instrument indenture.05.06.2021.doc
-
Size
79KB
-
MD5
c4b0617006900fdfdd3eaa762c68a8ef
-
SHA1
4ce54af01029c685759fe181dcc80633a0044630
-
SHA256
453e7a4314783ccee4547d5be1f17bd841599bebe9f9f6d8d3ba0b05be7cb059
-
SHA512
242fc7ce5d65647fd920d782d17427dec9e4cdd3e43f001fbb8dd04e35784e94bce2a4a7f7e76f1ebfa4675bdee7f5d426f2be54aa0e2a01781deb20199d0e12
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-