General
-
Target
PO 121873.xlsx
-
Size
713KB
-
Sample
220316-kjjv7abca8
-
MD5
9f2cf851a66d5ec3520dab2364619890
-
SHA1
cf6184531e30b05d1e5565d4626441c757240aa5
-
SHA256
2f5b78358322f5fd8c560d8a223282016decea4d3f74f5145283d3f1ec764ebc
-
SHA512
1da16064e04dcddd44e49cb4973a407c9502dbbe23d3247322c3114329994799219c7244bd4876bf9f89b1fe3cc7d6366704cb944e30bf56b5b6e6d7bf19230b
Static task
static1
Behavioral task
behavioral1
Sample
PO 121873.xlsx
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
PO 121873.xlsx
Resource
win10v2004-20220310-en
Malware Config
Targets
-
-
Target
PO 121873.xlsx
-
Size
713KB
-
MD5
9f2cf851a66d5ec3520dab2364619890
-
SHA1
cf6184531e30b05d1e5565d4626441c757240aa5
-
SHA256
2f5b78358322f5fd8c560d8a223282016decea4d3f74f5145283d3f1ec764ebc
-
SHA512
1da16064e04dcddd44e49cb4973a407c9502dbbe23d3247322c3114329994799219c7244bd4876bf9f89b1fe3cc7d6366704cb944e30bf56b5b6e6d7bf19230b
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-