General
-
Target
6MxvY1yp_hyx49p.zip
-
Size
2.2MB
-
Sample
220131-1xpxcsdba3
-
MD5
cf28ce0e870daa10e4e21a2f5ebd9e32
-
SHA1
4dc6b579f3c5bef639d5ac33b70bb06b638288a0
-
SHA256
9add27b1b3662450783504fd95ad604580ce05070fd2d869f0d0ffc0e4c08aaf
-
SHA512
0329b5052c2efd444b13081b334c4edd4110faf9d214eb4a87639680717a48813ea456d4850bbab19a91050721e01b6ab54a3cacfe98b3d9edf6c3218daadb9d
Static task
static1
Behavioral task
behavioral1
Sample
document[2022.01.31_15-32].xll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
document[2022.01.31_15-32].xll
Resource
win10v2004-en-20220113
Malware Config
Extracted
Targets
-
-
Target
document[2022.01.31_15-32].xll
-
Size
5.5MB
-
MD5
70828862c70defaa1247cbf982baa581
-
SHA1
d790adf35b62424622b37e9a8f6f7ad18f6103ec
-
SHA256
f1382d5cab7ee309b2a97cb31400fd30909c3b5789a3981081feec2788083edd
-
SHA512
faa6f6f9ced8a7415cb53766d2d0a5339952c0805ca100b971ba1852678149f10ffa1e72776b8937cae02347c56150f37a060d4bba3c575c75ad5c4233142471
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Sets service image path in registry
-
Loads dropped DLL
-