General
-
Target
TEPO0015922.doc
-
Size
242KB
-
Sample
230317-kl2h1sfb85
-
MD5
364dc6c0e8a18b796aa535516d04cb53
-
SHA1
da1e74c37691d9fd57eb2e73ef89b3aacbaa23d2
-
SHA256
dd6f2ad2370d52c77db8f3659c116f15c1897e2528694fe9f046be45928a2608
-
SHA512
f2efd5cb38e6474c83268e7454e268eee06f342cb5b55575a94a3cd206bf7096a8a4ca72a89f88e35668d8d4e39243ef5c2f097f438dd7a7c09716c2d4c3a1c0
-
SSDEEP
1536:i1iO8Lcs5Kpn0Ws/zhiordTpM6DiJW3BPLN4rZVzFz76mAg5eeVhMDw5wfL8:i+5xdXGVzFtr5RDAw5wfY
Static task
static1
Behavioral task
behavioral1
Sample
TEPO0015922.rtf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TEPO0015922.rtf
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
TEPO0015922.doc
-
Size
242KB
-
MD5
364dc6c0e8a18b796aa535516d04cb53
-
SHA1
da1e74c37691d9fd57eb2e73ef89b3aacbaa23d2
-
SHA256
dd6f2ad2370d52c77db8f3659c116f15c1897e2528694fe9f046be45928a2608
-
SHA512
f2efd5cb38e6474c83268e7454e268eee06f342cb5b55575a94a3cd206bf7096a8a4ca72a89f88e35668d8d4e39243ef5c2f097f438dd7a7c09716c2d4c3a1c0
-
SSDEEP
1536:i1iO8Lcs5Kpn0Ws/zhiordTpM6DiJW3BPLN4rZVzFz76mAg5eeVhMDw5wfL8:i+5xdXGVzFtr5RDAw5wfY
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-