General
-
Target
XsPMC.xlsm
-
Size
308KB
-
Sample
210722-7yeaav6acs
-
MD5
7d1241c321323ef058174eab91abe9f5
-
SHA1
e7f4a2edfaa2f7c01f3f37e79e2fc6422f522152
-
SHA256
6b20732f3ec329ae7463b4c4eddc6497d3a5f0ca7029b186b41078b762bf9339
-
SHA512
dfd47243bf944ac672f186a950ffe782fef5eebae8cde3db0a0d10465aca11e485acba3a9178d9d8cb821143493af84bef2da7242b421e92ad9a1762f83b73c1
Behavioral task
behavioral1
Sample
XsPMC.xlsm
Resource
win7v20210408
Behavioral task
behavioral2
Sample
XsPMC.xlsm
Resource
win10v20210410
Malware Config
Targets
-
-
Target
XsPMC.xlsm
-
Size
308KB
-
MD5
7d1241c321323ef058174eab91abe9f5
-
SHA1
e7f4a2edfaa2f7c01f3f37e79e2fc6422f522152
-
SHA256
6b20732f3ec329ae7463b4c4eddc6497d3a5f0ca7029b186b41078b762bf9339
-
SHA512
dfd47243bf944ac672f186a950ffe782fef5eebae8cde3db0a0d10465aca11e485acba3a9178d9d8cb821143493af84bef2da7242b421e92ad9a1762f83b73c1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-