General
-
Target
Invoice-343244_20211021.xlsb
-
Size
243KB
-
Sample
211021-vmt6faaef2
-
MD5
3196a0b77b44ba792558614a4aa236a1
-
SHA1
3110961e72744c54c4129291dc1a3d39d4b0b3e6
-
SHA256
37ce585f1134a397310c7f79b87be04eb0ce7b6c162f3e6523db5c0b7cd3f57d
-
SHA512
52df9c0de8fff1f22d696ed3a72fcf1166587b944815de74b6d0b397b488c6182fbf69211efdb5f870064f61ee5899432d0c72667b7a2432729ac7afa7cf1b58
Behavioral task
behavioral1
Sample
Invoice-343244_20211021.xlsb
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Invoice-343244_20211021.xlsb
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
Invoice-343244_20211021.xlsb
-
Size
243KB
-
MD5
3196a0b77b44ba792558614a4aa236a1
-
SHA1
3110961e72744c54c4129291dc1a3d39d4b0b3e6
-
SHA256
37ce585f1134a397310c7f79b87be04eb0ce7b6c162f3e6523db5c0b7cd3f57d
-
SHA512
52df9c0de8fff1f22d696ed3a72fcf1166587b944815de74b6d0b397b488c6182fbf69211efdb5f870064f61ee5899432d0c72667b7a2432729ac7afa7cf1b58
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-