General
-
Target
challenge-files.zip
-
Size
4.8MB
-
Sample
220810-tb58wscbeq
-
MD5
4edf33b3a4dd1c1c005aefeaa29c7f1d
-
SHA1
e4d4bb8c8dcf357b068019660fdc72e65f577857
-
SHA256
d312c079c51f2bf011902df86e1ca4cac84eb7c74ff104fa48a505caa88ef2fe
-
SHA512
b647d071e71ece4a4d5d4601f28cbcab9f12a85014f1d06cc80ed65f35c7d3f81fc0b27cfd0855b456194f50e7f5dd2ce9588077735c2ec7f43f4a1e38ee2803
Behavioral task
behavioral1
Sample
challenge-files.zip
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
challenge-files.zip
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
challenge-files.zip
-
Size
4.8MB
-
MD5
4edf33b3a4dd1c1c005aefeaa29c7f1d
-
SHA1
e4d4bb8c8dcf357b068019660fdc72e65f577857
-
SHA256
d312c079c51f2bf011902df86e1ca4cac84eb7c74ff104fa48a505caa88ef2fe
-
SHA512
b647d071e71ece4a4d5d4601f28cbcab9f12a85014f1d06cc80ed65f35c7d3f81fc0b27cfd0855b456194f50e7f5dd2ce9588077735c2ec7f43f4a1e38ee2803
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-