General
-
Target
Claim_A650.wsf
-
Size
75KB
-
Sample
230525-pxw5wsab54
-
MD5
b03fea25ae557aa8911e7784262806ed
-
SHA1
ec16cf2b88abb42dd92b1344498161c25a2a18db
-
SHA256
aa11cb5fe4d422867bcc83734380ba17e2fda100f76ad006cb388d19766c85eb
-
SHA512
393b2aa6fc45b12a07b131e63ad3dcca5d9fc4fb0e4f70a13c20a52003e5d49a97af370cfe4475db5acad0a4907f4e3390c94d29c1e481afdf971ae3548a09fc
-
SSDEEP
1536:RaBhLmtZP5UJm9+FWbS8PavlDhQGjI+UO/k4VoE:ehQ5kFiPavlDyP+UN4VoE
Static task
static1
Behavioral task
behavioral1
Sample
Claim_A650.wsf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Claim_A650.wsf
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Claim_A650.wsf
-
Size
75KB
-
MD5
b03fea25ae557aa8911e7784262806ed
-
SHA1
ec16cf2b88abb42dd92b1344498161c25a2a18db
-
SHA256
aa11cb5fe4d422867bcc83734380ba17e2fda100f76ad006cb388d19766c85eb
-
SHA512
393b2aa6fc45b12a07b131e63ad3dcca5d9fc4fb0e4f70a13c20a52003e5d49a97af370cfe4475db5acad0a4907f4e3390c94d29c1e481afdf971ae3548a09fc
-
SSDEEP
1536:RaBhLmtZP5UJm9+FWbS8PavlDhQGjI+UO/k4VoE:ehQ5kFiPavlDyP+UN4VoE
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-