General
-
Target
transact_details_031399515.xlsb
-
Size
61KB
-
Sample
210610-75l47vensn
-
MD5
ac4f72de702d20fa91a780026f409325
-
SHA1
1f5f84efac222661cbc466878e3ddcdfe76e8234
-
SHA256
69f93b8727e96fa3ea824c7893c28e9f94ce39e4de3c10537b479856a33b2fa7
-
SHA512
f66f78d6bc413e798ecce1999d8c85caa9e1727a97443f751a44be4efb9a077e4c60908291ab8909374de5af5ac2cd7c07c7f0f6c388d69ad7b86ef3aaa1d439
Behavioral task
behavioral1
Sample
transact_details_031399515.xlsb
Resource
win10v20210408
Malware Config
Targets
-
-
Target
transact_details_031399515.xlsb
-
Size
61KB
-
MD5
ac4f72de702d20fa91a780026f409325
-
SHA1
1f5f84efac222661cbc466878e3ddcdfe76e8234
-
SHA256
69f93b8727e96fa3ea824c7893c28e9f94ce39e4de3c10537b479856a33b2fa7
-
SHA512
f66f78d6bc413e798ecce1999d8c85caa9e1727a97443f751a44be4efb9a077e4c60908291ab8909374de5af5ac2cd7c07c7f0f6c388d69ad7b86ef3aaa1d439
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-