General
-
Target
2ec3f8494cb4c00abe5d1a93175d801a5fc0c01748f3791cf18092983eda287f
-
Size
98KB
-
Sample
220520-1wcweaech7
-
MD5
13c1aed80b91f34b9cc0a0a4199fc5fc
-
SHA1
435d51fe09c0c9fb8d7d4d835e2584f8ddf738d9
-
SHA256
2ec3f8494cb4c00abe5d1a93175d801a5fc0c01748f3791cf18092983eda287f
-
SHA512
c25101a27fe0f7faf77a11f7988f16ba2051f8c2bd7889c711f042fd36b8681dc185f03191e2fd8b949c624d1d57b189c49b6c51e3063b2814694dd047e6d5fa
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
28b09e17a8819c703bd6600e62b5407a
-
SHA1
363b51c1f483093eae802ad6939363a50bbf9b4d
-
SHA256
23f6ed44eda0ab1b7274653b618ac891a8cbd3c467f8b658297cf68173bb842f
-
SHA512
7e1408590957ab36dc608f3a4c5fd5dc81ce71032796fefd30257b4fd2f782b824268e20745c7a450c56dc0e12888ea6377f3e4f420ae93001cdfcfb8628d7cf
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-