General
-
Target
Claim_C659.wsf
-
Size
76KB
-
Sample
230525-gva6msgc65
-
MD5
ba7674b458f956711a54ac00754453a9
-
SHA1
4cb6d280125c6061216d7ed825c01b1a5e953ed3
-
SHA256
230f9745aeb5c286883bb97a44dee7a849bd224874f2ef24681beb404530c5e7
-
SHA512
4b763f8d6a057fa547ac3708f515474db876e78e8dc24684b394ba7fe2ba51873f6faf33aacd79dbdf5d936be29b14c3e5b344e38227dc9fd9cee8409bab3199
-
SSDEEP
1536:v7fwi6kwivcLjW9WEmMdMWqrND9jYzQQQilj96:v7fw3kwvj/qudrNRYzQQQuI
Static task
static1
Behavioral task
behavioral1
Sample
Claim_C659.wsf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Claim_C659.wsf
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Claim_C659.wsf
-
Size
76KB
-
MD5
ba7674b458f956711a54ac00754453a9
-
SHA1
4cb6d280125c6061216d7ed825c01b1a5e953ed3
-
SHA256
230f9745aeb5c286883bb97a44dee7a849bd224874f2ef24681beb404530c5e7
-
SHA512
4b763f8d6a057fa547ac3708f515474db876e78e8dc24684b394ba7fe2ba51873f6faf33aacd79dbdf5d936be29b14c3e5b344e38227dc9fd9cee8409bab3199
-
SSDEEP
1536:v7fwi6kwivcLjW9WEmMdMWqrND9jYzQQQilj96:v7fw3kwvj/qudrNRYzQQQuI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-