General
-
Target
particulars 05.21.doc
-
Size
79KB
-
Sample
210507-scftbyc4rs
-
MD5
aede2279e9119fb59a149df05eebc033
-
SHA1
63876f641ae31b27eb0358cbaa27d3d209d85846
-
SHA256
71d43c3bd77297b86d32742576c043f274ff9becd515f4f477e56daa642ec92d
-
SHA512
d1041a0af15d3f05f1d7e32ab65f352f5cca9b7b602bb9105e717877208847c23903ff1752b6a1c196c76f4f61d76015408c44877163dedb28e4663c8136d97b
Static task
static1
Behavioral task
behavioral1
Sample
particulars 05.21.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
particulars 05.21.doc
Resource
win10v20210410
Malware Config
Targets
-
-
Target
particulars 05.21.doc
-
Size
79KB
-
MD5
aede2279e9119fb59a149df05eebc033
-
SHA1
63876f641ae31b27eb0358cbaa27d3d209d85846
-
SHA256
71d43c3bd77297b86d32742576c043f274ff9becd515f4f477e56daa642ec92d
-
SHA512
d1041a0af15d3f05f1d7e32ab65f352f5cca9b7b602bb9105e717877208847c23903ff1752b6a1c196c76f4f61d76015408c44877163dedb28e4663c8136d97b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-