General
-
Target
files.05.21.doc
-
Size
79KB
-
Sample
210507-4tsnz15aqj
-
MD5
1c61ab6f2bdf43b93bb5233f6ca6c5e4
-
SHA1
8fc13c1610d5a040682cdd1d22e85f6ce2fda3d4
-
SHA256
ccc7f7f06d6151aac48f2e5eb6162f58c49084c4d46c28d48222ebadff5b6e2d
-
SHA512
67ca04cc899d14c9316147c3f4f7eff57f96a0420fca47ad78e233807832f750d3d5462c325f95b63a43ada15b308bc412cb0c0448fb725b7e30e1c8cee19885
Static task
static1
Behavioral task
behavioral1
Sample
files.05.21.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
files.05.21.doc
Resource
win10v20210410
Malware Config
Targets
-
-
Target
files.05.21.doc
-
Size
79KB
-
MD5
1c61ab6f2bdf43b93bb5233f6ca6c5e4
-
SHA1
8fc13c1610d5a040682cdd1d22e85f6ce2fda3d4
-
SHA256
ccc7f7f06d6151aac48f2e5eb6162f58c49084c4d46c28d48222ebadff5b6e2d
-
SHA512
67ca04cc899d14c9316147c3f4f7eff57f96a0420fca47ad78e233807832f750d3d5462c325f95b63a43ada15b308bc412cb0c0448fb725b7e30e1c8cee19885
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-