General
-
Target
Claim_C856.wsf
-
Size
95KB
-
Sample
230425-t12xrsdd5t
-
MD5
b9803ab344fda06c35564abc686e41ca
-
SHA1
af3ed285c5359919d1470134264be7d546f9a02f
-
SHA256
31a7f78871a4d57dadfdaba00a77436f395619ee49084bac4fd3e57b2d306087
-
SHA512
b8b748eb4c003aeda928f8e5118e6bdb07c635efd7b17047a9c0183c83a22fb8beee6a7e427eeda950e6bab2e5e867978e100c90ae77cb6a15afe24e4410bafc
-
SSDEEP
1536:63DbXLN16gq3NlDhxN16gJcN16giU9IZTb0GW741rtr8wsr+BFa7z8hiKtlDJK9I:qbXLNFq3NlDHNFJcNFiU9Ix0LEOwsSBX
Static task
static1
Behavioral task
behavioral1
Sample
Claim_C856.wsf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Claim_C856.wsf
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Claim_C856.wsf
-
Size
95KB
-
MD5
b9803ab344fda06c35564abc686e41ca
-
SHA1
af3ed285c5359919d1470134264be7d546f9a02f
-
SHA256
31a7f78871a4d57dadfdaba00a77436f395619ee49084bac4fd3e57b2d306087
-
SHA512
b8b748eb4c003aeda928f8e5118e6bdb07c635efd7b17047a9c0183c83a22fb8beee6a7e427eeda950e6bab2e5e867978e100c90ae77cb6a15afe24e4410bafc
-
SSDEEP
1536:63DbXLN16gq3NlDhxN16gJcN16giU9IZTb0GW741rtr8wsr+BFa7z8hiKtlDJK9I:qbXLNFq3NlDHNFJcNFiU9Ix0LEOwsSBX
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-