General
-
Target
ORDER_SHEET_SPEC.zip
-
Size
67KB
-
Sample
230326-dg72nsfc86
-
MD5
93bf58d227852a25c0ad12750ebfea86
-
SHA1
bfab6abb9c7444ff31dbbcba92fee92daaaa5679
-
SHA256
22e8e4fb8b26ad737393013f09fdd97aad5e7d69cb7d6a7154ca3c476b920e7c
-
SHA512
6cc39c534ad5f1802a1a59b7767cb7d14139b70c93da6333374bb5a302e13ce8062c0065db2688b0234059b6dda89a78be045e78d2d59fc0aa97fa6484626525
-
SSDEEP
1536:fPUnQ+SlGNawF+lG6xzDK4qyq+niREciATBkvJp2WEgcySKeGI/f:fPUnQlUawkE6BDK4qeiWc3BkX2bgcOeZ
Behavioral task
behavioral1
Sample
ORDER SHEET & SPEC.xlsm
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
ORDER SHEET & SPEC.xlsm
-
Size
2.7MB
-
MD5
7ccf88c0bbe3b29bf19d877c4596a8d4
-
SHA1
23f0506d857d38c3cd5354b80afc725b5f034744
-
SHA256
7bcd31bd41686c32663c7cabf42b18c50399e3b3b4533fc2ff002d9f2e058813
-
SHA512
0ec8f398d9ab943e2e38a086d87d750eccc081fb73c6357319e79fe9f69e66a5566c00ce6d297d0d5fadaa5c04220dcf4d9adea1e0c1f88f335dc1c63797dfdc
-
SSDEEP
1536:Hhh3S1cLkPROxXYvoYIZCMMV2ZX0nIcjELcE3E:0cCOxtYIEbsX0n98E
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-