General
-
Target
sample.doc
-
Size
97KB
-
Sample
210721-kvmxln291a
-
MD5
356a5c57245204778e4987ca33558603
-
SHA1
295160cddc9a18dc0809c547908e19e4272e01f3
-
SHA256
105d9496d4f80ae5ef3c7642f55117b65a10398afe5ff9c30d706fa9873cfd6a
-
SHA512
27b256f8c7c8eeed8b0bca491e92c75541b53c594e5f1e6f63d923eda9748939ae7aedac3e2be592801a36c6ff56fabb6cdd847116f97fff76422092a15d8670
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7v20210410
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v20210408
Malware Config
Targets
-
-
Target
sample.doc
-
Size
97KB
-
MD5
356a5c57245204778e4987ca33558603
-
SHA1
295160cddc9a18dc0809c547908e19e4272e01f3
-
SHA256
105d9496d4f80ae5ef3c7642f55117b65a10398afe5ff9c30d706fa9873cfd6a
-
SHA512
27b256f8c7c8eeed8b0bca491e92c75541b53c594e5f1e6f63d923eda9748939ae7aedac3e2be592801a36c6ff56fabb6cdd847116f97fff76422092a15d8670
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-