General
-
Target
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b
-
Size
180KB
-
Sample
220201-f8y9yshdel
-
MD5
bf448dd849e38068072e7f242e59a387
-
SHA1
e70fca9132fd8b82a6409c2cb40b34062634f5e2
-
SHA256
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b
-
SHA512
08091b6ee72fb42effb51f72be934dd8f4ca7e01f8c54ef4af12f6437ccfe8a006407d93e4c7240f9dda3bf1a0cda2349329bf2739c89b5bcc6f0575d2482a96
Static task
static1
Behavioral task
behavioral1
Sample
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b.doc
Resource
win10v2004-en-20220112
Malware Config
Extracted
http://animzzz.net/wp-content/I_0f/
http://apnaoasis.com/wp-content/Y3_iT/
http://acsboda.com/wp-includes/yn_gp/
http://congchung.isocial.vn/img/6S_yF/
http://www.axasta.com/wp-content/T8_Fp/
Targets
-
-
Target
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b
-
Size
180KB
-
MD5
bf448dd849e38068072e7f242e59a387
-
SHA1
e70fca9132fd8b82a6409c2cb40b34062634f5e2
-
SHA256
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b
-
SHA512
08091b6ee72fb42effb51f72be934dd8f4ca7e01f8c54ef4af12f6437ccfe8a006407d93e4c7240f9dda3bf1a0cda2349329bf2739c89b5bcc6f0575d2482a96
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Drops file in System32 directory
-