General
-
Target
PAYMENT_ADVICE_2210008WF.xls
-
Size
123KB
-
Sample
220811-n4fk2shbd6
-
MD5
7eeb6c4c06e2b7f1b61dcbcc5ed1cf2f
-
SHA1
77d637d3c716cbc95626efb9483bc9e39d34e765
-
SHA256
4f3eca65d342de5bb3f92364f8639d1c492d450cdeff7e69583a198e3ade465c
-
SHA512
7983cc21f3203999f315c6ea1ebf30e47903624fb830aaf253234d69f62212134c3bc4cbd2ebe6ba55ea4df91680522b4019142ca3612dcb3b5a76681642cc0f
Behavioral task
behavioral1
Sample
PAYMENT_ADVICE_2210008WF.xls
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
PAYMENT_ADVICE_2210008WF.xls
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
PAYMENT_ADVICE_2210008WF.xls
-
Size
123KB
-
MD5
7eeb6c4c06e2b7f1b61dcbcc5ed1cf2f
-
SHA1
77d637d3c716cbc95626efb9483bc9e39d34e765
-
SHA256
4f3eca65d342de5bb3f92364f8639d1c492d450cdeff7e69583a198e3ade465c
-
SHA512
7983cc21f3203999f315c6ea1ebf30e47903624fb830aaf253234d69f62212134c3bc4cbd2ebe6ba55ea4df91680522b4019142ca3612dcb3b5a76681642cc0f
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-