General
-
Target
input 07.21.2021.doc
-
Size
72KB
-
Sample
210721-p6p4rt1wsa
-
MD5
2405219be1d899e9d361e0f4458cff83
-
SHA1
7dc5167b155ec70d09bba50290533fee5b7649ce
-
SHA256
7ddb285312948e5156adf11beb10a5970ac6a02382c7a11ce3217c70358e596f
-
SHA512
079879ded584395310ed36d6c2e1070875bdb42a316b1cd2b944d590e029a3b14f64ad18c7622a60fcaf9ef0ce13a7539f87bbd6472a6611867fd4a3d39102bb
Static task
static1
Behavioral task
behavioral1
Sample
input 07.21.2021.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
input 07.21.2021.doc
Resource
win10v20210410
Malware Config
Targets
-
-
Target
input 07.21.2021.doc
-
Size
72KB
-
MD5
2405219be1d899e9d361e0f4458cff83
-
SHA1
7dc5167b155ec70d09bba50290533fee5b7649ce
-
SHA256
7ddb285312948e5156adf11beb10a5970ac6a02382c7a11ce3217c70358e596f
-
SHA512
079879ded584395310ed36d6c2e1070875bdb42a316b1cd2b944d590e029a3b14f64ad18c7622a60fcaf9ef0ce13a7539f87bbd6472a6611867fd4a3d39102bb
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-