General
-
Target
Invoice-5959498320211004.xlsb
-
Size
132KB
-
Sample
211209-wmyz3aeefp
-
MD5
887bc475305003bdc34e671a2f3bd080
-
SHA1
7625f787be7479bf54addeff0ce7107cf0f59f23
-
SHA256
7e0b4b26bafd471703fac1db25b24936230aecad95732e66420184d717a111ee
-
SHA512
efb52e8c1fdf6e7cbc80b951220e25c78be0aad5c24b732696784b9b4d5d2c7a284df11fb0f524f64fa3f39a887069599c91f5233062d2aa8c01617104dd9ccd
Behavioral task
behavioral1
Sample
Invoice-5959498320211004.xlsb
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Invoice-5959498320211004.xlsb
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
Invoice-5959498320211004.xlsb
-
Size
132KB
-
MD5
887bc475305003bdc34e671a2f3bd080
-
SHA1
7625f787be7479bf54addeff0ce7107cf0f59f23
-
SHA256
7e0b4b26bafd471703fac1db25b24936230aecad95732e66420184d717a111ee
-
SHA512
efb52e8c1fdf6e7cbc80b951220e25c78be0aad5c24b732696784b9b4d5d2c7a284df11fb0f524f64fa3f39a887069599c91f5233062d2aa8c01617104dd9ccd
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-