General
-
Target
blank.xlsm
-
Size
3KB
-
Sample
221010-qqegyacbel
-
MD5
303107e8bec176e787b30e554283d1b7
-
SHA1
f7d998ee5ecfbc7d9f270ea74bb2fb16701fb272
-
SHA256
2ebfb80cbbd66cb7fc4d2e18f7e89cde1dcf53fc987af376f08fd5ada63543e0
-
SHA512
b6c56d1154e6e85a9d6e3efa78d6a3fb49a25acd432a79107f9b243f409df186bee2abaebdf75f9debed027587573214bd9e9a8249db909c706fc807c620b7a5
Behavioral task
behavioral1
Sample
blank.xlsm
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
blank.xlsm
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
blank.xlsm
-
Size
3KB
-
MD5
303107e8bec176e787b30e554283d1b7
-
SHA1
f7d998ee5ecfbc7d9f270ea74bb2fb16701fb272
-
SHA256
2ebfb80cbbd66cb7fc4d2e18f7e89cde1dcf53fc987af376f08fd5ada63543e0
-
SHA512
b6c56d1154e6e85a9d6e3efa78d6a3fb49a25acd432a79107f9b243f409df186bee2abaebdf75f9debed027587573214bd9e9a8249db909c706fc807c620b7a5
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-