General
-
Target
a87f8c17ebd946709b07aca9b846c4c3a766d567da3f9ab97c21cbbd81e34da3
-
Size
98KB
-
Sample
220520-z93hjsdfd9
-
MD5
2e0ae931d5b7b6871f6207b132ea3dd3
-
SHA1
d5395d5953a006a3140dc5aee50300d18bdcb8f0
-
SHA256
a87f8c17ebd946709b07aca9b846c4c3a766d567da3f9ab97c21cbbd81e34da3
-
SHA512
fdc1a3aae9baf6b0acdc4e07dbfc0e081fa09f98fb80a0730c5020dae779c13b995290d09d0fd12350167596ad25c89e4e6ca438435f01cffb7d6992ea955b3f
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
168KB
-
MD5
6e085a8a086811e7468129fdc959af21
-
SHA1
9069f7c4cfdd7902ddc78bd00038173dd51f4e0a
-
SHA256
63c966c20ccc686dfa62a5063bff299d385ea9f159cc9a5b79dc59063fb9514f
-
SHA512
7567a863318ad89124ae5dd2ded563fafd35f8e43e9b3666a58547dce8e89a6d67360afbeb25521693f863122046dc0503e30970cf8bcd086685651be5cca3c7
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-