General
-
Target
inquiry.05.17.21.doc
-
Size
65KB
-
Sample
210705-zn2djalaha
-
MD5
e0452e225acb088de11d6517db7479ac
-
SHA1
298ea7b0e1035975e024876665aa13f2a15ea8f7
-
SHA256
7215e503b77bdd7fd48b5f63cbce288bf0caa00ed5688bc9b810cb51ed3a765a
-
SHA512
376a1bb04cfc540f2e7ddc3c7a9d69dce0126dd94b6a13c073c556c82a9eb9857437bb3aa90e2964bf89e8036cca7a32d193bdc67f44218560825c6770ea85f8
Static task
static1
Behavioral task
behavioral1
Sample
inquiry.05.17.21.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
inquiry.05.17.21.doc
Resource
win10v20210410
Malware Config
Targets
-
-
Target
inquiry.05.17.21.doc
-
Size
65KB
-
MD5
e0452e225acb088de11d6517db7479ac
-
SHA1
298ea7b0e1035975e024876665aa13f2a15ea8f7
-
SHA256
7215e503b77bdd7fd48b5f63cbce288bf0caa00ed5688bc9b810cb51ed3a765a
-
SHA512
376a1bb04cfc540f2e7ddc3c7a9d69dce0126dd94b6a13c073c556c82a9eb9857437bb3aa90e2964bf89e8036cca7a32d193bdc67f44218560825c6770ea85f8
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-