General
-
Target
doc_E950_May_30.zip
-
Size
1KB
-
Sample
230530-rey8msac6t
-
MD5
8bb0644c9247e0ee51b21e5f3305bda6
-
SHA1
a206b7577d2ebfc102fd29ee9bb7404d6f443f6b
-
SHA256
df6fec758cea6ea8caf816a227846d3409045264c1acb49d5f12a0525b9d69be
-
SHA512
ea22c2479eba5ba021561f67b4afb49aa6335e8db77e14ea17941bc7cb9939af6d26a38184c9ed155c1e40dc3b9b7b20f5c95fc69deefcf308b5290fcee3eef4
Static task
static1
Behavioral task
behavioral1
Sample
doc_E951_May_30.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
doc_E951_May_30.js
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
doc_E951_May_30.js
-
Size
4KB
-
MD5
5e2dcc6d7a1df71def41399fff9b98b5
-
SHA1
a28875566f6102d7bf96fae638976ee8cc900bfe
-
SHA256
ac8ac0c34b12b67ebf21e8f7bc528462c8e3faef8168288d55c9d020113f8c10
-
SHA512
65e3386db8ee20a3ed5afeb4c49a01798d7d2224364ec96c34b0fd84af0ac249b0aad2de5df6c3542ec2470eb4178f9ed151f7c2eaa7e981933e753384726494
-
SSDEEP
96:huOfb5tC7CVXrqujA4d9zdnTCvdFw8H/vz63wN:Zfb5EuhrqujAEdRm
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-