General
-
Target
idoweddingcarsnifile12.23.2022.docm
-
Size
1.3MB
-
Sample
221224-wlxevaad33
-
MD5
4f1f3962f51767cb687e21caa52ec86d
-
SHA1
0886d9a017d527fca5d347a05f1ebd9006160846
-
SHA256
a531fa89547828c68554b4a358cb4eaa21198e9b1fcd8efcbbfa5bbf295217ec
-
SHA512
e1c3419bfd0c4fa57b327c2ccc547f6622a586842189e72788d3c6b0515a81812f45170393b1e445b1b3cca66127d74a1fb8cf1dbcaee8ec8972379c1bae57c9
-
SSDEEP
24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD8G7EzqHm+BmcS:/CpJmgf3zliFpp/KqG+y
Behavioral task
behavioral1
Sample
idoweddingcarsnifile12.23.2022.docm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
idoweddingcarsnifile12.23.2022.docm
Resource
win10v2004-20220812-en
Malware Config
Extracted
icedid
1212497363
trbiriumpa.com
Targets
-
-
Target
idoweddingcarsnifile12.23.2022.docm
-
Size
1.3MB
-
MD5
4f1f3962f51767cb687e21caa52ec86d
-
SHA1
0886d9a017d527fca5d347a05f1ebd9006160846
-
SHA256
a531fa89547828c68554b4a358cb4eaa21198e9b1fcd8efcbbfa5bbf295217ec
-
SHA512
e1c3419bfd0c4fa57b327c2ccc547f6622a586842189e72788d3c6b0515a81812f45170393b1e445b1b3cca66127d74a1fb8cf1dbcaee8ec8972379c1bae57c9
-
SSDEEP
24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD8G7EzqHm+BmcS:/CpJmgf3zliFpp/KqG+y
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-