General
-
Target
917661-360471-585554.xlsm
-
Size
140KB
-
Sample
210721-v6r1xrdjf2
-
MD5
544e73f142414024f15bdd34b80038bf
-
SHA1
ff39e6d9c11ebfea8b5a048fd75779d1f0d00c30
-
SHA256
438d6732eaeeb91b31df0f21d39eabd2fce3737c2fcd80d76c47fcfb473b988e
-
SHA512
b98ee3a2ad80d7f942ac3a5c2456f08fbd167c72c6a703d0052397775c39cd2e462bf6c0bdacaaaa5badc6b5257fc7b33ad7353a2661d6f382129672999f6535
Behavioral task
behavioral1
Sample
917661-360471-585554.xlsm
Resource
win7v20210410
Behavioral task
behavioral2
Sample
917661-360471-585554.xlsm
Resource
win10v20210408
Malware Config
Targets
-
-
Target
917661-360471-585554.xlsm
-
Size
140KB
-
MD5
544e73f142414024f15bdd34b80038bf
-
SHA1
ff39e6d9c11ebfea8b5a048fd75779d1f0d00c30
-
SHA256
438d6732eaeeb91b31df0f21d39eabd2fce3737c2fcd80d76c47fcfb473b988e
-
SHA512
b98ee3a2ad80d7f942ac3a5c2456f08fbd167c72c6a703d0052397775c39cd2e462bf6c0bdacaaaa5badc6b5257fc7b33ad7353a2661d6f382129672999f6535
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-