General
-
Target
1.hta
-
Size
2KB
-
Sample
210819-qvpqyzvlrs
-
MD5
c5f48abc68324cd059e74b35c44b64c7
-
SHA1
e68b086934eb0d4576ac3711062efba4236df436
-
SHA256
9a3c69a9e5f02c1e3022586c5ffe3e9dca7224f4c5107ce1f758eae62f747576
-
SHA512
271dedd705ed5a64cda497d0b86cd1509f34911602aac65cbc8a5120ef37efccc2ec8d45538cec29e1bbb5aa5fb5d76aa0a3502e00208e0c4067d4dd9b465d21
Static task
static1
Behavioral task
behavioral1
Sample
1.hta
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1.hta
Resource
win10v20210410
Malware Config
Targets
-
-
Target
1.hta
-
Size
2KB
-
MD5
c5f48abc68324cd059e74b35c44b64c7
-
SHA1
e68b086934eb0d4576ac3711062efba4236df436
-
SHA256
9a3c69a9e5f02c1e3022586c5ffe3e9dca7224f4c5107ce1f758eae62f747576
-
SHA512
271dedd705ed5a64cda497d0b86cd1509f34911602aac65cbc8a5120ef37efccc2ec8d45538cec29e1bbb5aa5fb5d76aa0a3502e00208e0c4067d4dd9b465d21
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-