General
-
Target
6988a0aa635c18ecdcba1e5d5adf79d97b7724ee531bdb3497d7fa7294a7455b.zip
-
Size
175KB
-
Sample
220726-vcz9psehf4
-
MD5
7fd5240c83b2da5b0080a4388e8f044c
-
SHA1
eb8fa5fb917c08fa0824533f9f54193f41602eee
-
SHA256
30bbfc2671b6741debfe9a469c2587e8ecc90197daf44e86f84bbcfa969abe4e
-
SHA512
6e103964162053fe9d7902e8288c5c723ae2491522631bfe9781e2a4efbe0442f7406939a41ab125c3781be9d23d5fcf269f92f178c0c93182229cff618fdbf4
Static task
static1
Behavioral task
behavioral1
Sample
6988a0aa635c18ecdcba1e5d5adf79d97b7724ee531bdb3497d7fa7294a7455b.xlsx
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
6988a0aa635c18ecdcba1e5d5adf79d97b7724ee531bdb3497d7fa7294a7455b.xlsx
-
Size
181KB
-
MD5
29e34f6ac4428d885814569fde955321
-
SHA1
acb427f920b588403c088dee736ec4084c9cd948
-
SHA256
6988a0aa635c18ecdcba1e5d5adf79d97b7724ee531bdb3497d7fa7294a7455b
-
SHA512
55259390b41e3d09076910bb61ead7fea192e3a3cc7f53c32513b306d71045d50e5936701743d42795f4d4d35cdb2926861571c4ebb639ec8bed55602df64f55
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Adds Run key to start application
-