General
-
Target
documents-010.21.doc
-
Size
34KB
-
Sample
211021-vj4wgabdfl
-
MD5
45b351e528729b2497285224a2cba401
-
SHA1
49cca34a6d2338c575cd82e9eff6984f388e50a9
-
SHA256
0e412a3579154b025a22360faf38aac50ddb3b02d1b71e0293588f341306593a
-
SHA512
3a1e4032e37850250213a61911f4229eb33defc5f508bbfa71fd9cc794bfa47c86bc121acd8acddf241d8d6dfc07819ee73f7bfa151d6e5f1886c1cba2f19be8
Static task
static1
Behavioral task
behavioral1
Sample
documents-010.21.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
documents-010.21.doc
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
documents-010.21.doc
-
Size
34KB
-
MD5
45b351e528729b2497285224a2cba401
-
SHA1
49cca34a6d2338c575cd82e9eff6984f388e50a9
-
SHA256
0e412a3579154b025a22360faf38aac50ddb3b02d1b71e0293588f341306593a
-
SHA512
3a1e4032e37850250213a61911f4229eb33defc5f508bbfa71fd9cc794bfa47c86bc121acd8acddf241d8d6dfc07819ee73f7bfa151d6e5f1886c1cba2f19be8
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-