General
-
Target
SecuriteInfo.com.Exploit.Siggen3.17232.17500.3732
-
Size
33KB
-
Sample
220816-jly78ahad7
-
MD5
72b9a844ed7ab767c1de85facfb4ad04
-
SHA1
88d41799156fcc5c6dc80124cc55cc3f96d940b6
-
SHA256
392de25228482e17400c27ca87cfe91ddf60b1dedcffd36cad1c52c6a0f7c4d0
-
SHA512
7214899618bd9ec54db02340a86a345c5273d12c4694f29ebff0d5515fd1eec72b4b4a30f1a267d3e070d7a2d92dbb850ec5f1bec88f0509e103b6f380c9f28b
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen3.17232.17500.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Siggen3.17232.17500.xls
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Exploit.Siggen3.17232.17500.3732
-
Size
33KB
-
MD5
72b9a844ed7ab767c1de85facfb4ad04
-
SHA1
88d41799156fcc5c6dc80124cc55cc3f96d940b6
-
SHA256
392de25228482e17400c27ca87cfe91ddf60b1dedcffd36cad1c52c6a0f7c4d0
-
SHA512
7214899618bd9ec54db02340a86a345c5273d12c4694f29ebff0d5515fd1eec72b4b4a30f1a267d3e070d7a2d92dbb850ec5f1bec88f0509e103b6f380c9f28b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-