General
-
Target
Invoice- 098765 Oil_Field.doc
-
Size
55KB
-
Sample
211014-mcjb7aghd6
-
MD5
8a29b9010eae426089e59eab57bcd1de
-
SHA1
96b75aafab14b177b758d5735f84881f43698c6e
-
SHA256
0b402031b8fe72ed0557559cc41a4b36cbdcdc55dcc015e966aabdb4af8a2fd6
-
SHA512
fa754009bc1118cca669755aab803f5ceda44845fb3956c5da6c18258e1eb527e2d027e6fb9a3390aad376bb1f0419d6039aab21ca1f5c9261bd6f82e514dff5
Behavioral task
behavioral1
Sample
Invoice- 098765 Oil_Field.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Invoice- 098765 Oil_Field.doc
Resource
win10v20210408
Malware Config
Extracted
https://secure01wa.2waky.com/a/eApp2.exe
Targets
-
-
Target
Invoice- 098765 Oil_Field.doc
-
Size
55KB
-
MD5
8a29b9010eae426089e59eab57bcd1de
-
SHA1
96b75aafab14b177b758d5735f84881f43698c6e
-
SHA256
0b402031b8fe72ed0557559cc41a4b36cbdcdc55dcc015e966aabdb4af8a2fd6
-
SHA512
fa754009bc1118cca669755aab803f5ceda44845fb3956c5da6c18258e1eb527e2d027e6fb9a3390aad376bb1f0419d6039aab21ca1f5c9261bd6f82e514dff5
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-