General
-
Target
520a3206c97f5738b80ca923bedd47915107713b.docx
-
Size
10KB
-
Sample
210531-2r1pqkvgcj
-
MD5
a5319ab43908080f8173e54919f0898c
-
SHA1
520a3206c97f5738b80ca923bedd47915107713b
-
SHA256
aa5f7f84299113a12a6d23d8fe5eaa83d8543bb729af2da4afaef1080fa893a8
-
SHA512
d385015438914e6b40996c5a6eae111524c3fabc5ce27cae306b0db5405dcaa483d6eed6114b1c3795110547fa5924f7f22b51f3ad82bf8492bbb433a30f6e32
Static task
static1
Behavioral task
behavioral1
Sample
520a3206c97f5738b80ca923bedd47915107713b.docx
Resource
win7v20210410
Behavioral task
behavioral2
Sample
520a3206c97f5738b80ca923bedd47915107713b.docx
Resource
win10v20210408
Malware Config
Extracted
https://cutt.ly/tnqANmo
Targets
-
-
Target
520a3206c97f5738b80ca923bedd47915107713b.docx
-
Size
10KB
-
MD5
a5319ab43908080f8173e54919f0898c
-
SHA1
520a3206c97f5738b80ca923bedd47915107713b
-
SHA256
aa5f7f84299113a12a6d23d8fe5eaa83d8543bb729af2da4afaef1080fa893a8
-
SHA512
d385015438914e6b40996c5a6eae111524c3fabc5ce27cae306b0db5405dcaa483d6eed6114b1c3795110547fa5924f7f22b51f3ad82bf8492bbb433a30f6e32
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Abuses OpenXML format to download file from external location
-