General
-
Target
Invoice-3045_20211013.xlsb
-
Size
215KB
-
Sample
211018-slr9caegdn
-
MD5
4705fb956a9c848adbdf5c3d063f99d6
-
SHA1
0c2f1960bb73813fd47c074712b4cce7f78a6674
-
SHA256
072576f21e0a485894421eb56b434213582b7d1080acc298a6dcf41d52f7af14
-
SHA512
7c6453bcd4a22c9de6aa6d1b50c6a7b09e370e5ad108226e39cba0f3ca86a3341d462b1602698a7fd867b7f084c883ec467614d3249c07fe8dbd3892935677af
Behavioral task
behavioral1
Sample
Invoice-3045_20211013.xlsb
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Invoice-3045_20211013.xlsb
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
Invoice-3045_20211013.xlsb
-
Size
215KB
-
MD5
4705fb956a9c848adbdf5c3d063f99d6
-
SHA1
0c2f1960bb73813fd47c074712b4cce7f78a6674
-
SHA256
072576f21e0a485894421eb56b434213582b7d1080acc298a6dcf41d52f7af14
-
SHA512
7c6453bcd4a22c9de6aa6d1b50c6a7b09e370e5ad108226e39cba0f3ca86a3341d462b1602698a7fd867b7f084c883ec467614d3249c07fe8dbd3892935677af
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-