General
-
Target
uhr_90872_R7345655.xlsm
-
Size
185KB
-
Sample
210706-w4dksrdxj2
-
MD5
baea0f9bc6a94b1eafbd2b356ffd6fc9
-
SHA1
f6d1575abe7189114b01a91002f07332ad05afa9
-
SHA256
a8000b09f3b22ff8a84435b1de3b79284591638cc18cd7a03d3668c20303119e
-
SHA512
4c3d4566c109caf04b63a702ce8aaffcfc136141f5efbe5dfec3305013e5671525530888b3bdacd291b25c7f8896201092f6b4ad55e6a7296759e7d6b8ea2626
Behavioral task
behavioral1
Sample
uhr_90872_R7345655.xlsm
Resource
win7v20210410
Malware Config
Extracted
http://thousandsyears.download/div/44376,8555986111.jpg
http://voopeople.fun/div/44376,8555986111.jpg
http://uppercilio.fun/div/44376,8555986111.jpg
Targets
-
-
Target
uhr_90872_R7345655.xlsm
-
Size
185KB
-
MD5
baea0f9bc6a94b1eafbd2b356ffd6fc9
-
SHA1
f6d1575abe7189114b01a91002f07332ad05afa9
-
SHA256
a8000b09f3b22ff8a84435b1de3b79284591638cc18cd7a03d3668c20303119e
-
SHA512
4c3d4566c109caf04b63a702ce8aaffcfc136141f5efbe5dfec3305013e5671525530888b3bdacd291b25c7f8896201092f6b4ad55e6a7296759e7d6b8ea2626
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-