General
-
Target
doc_ABCD_May31.zip
-
Size
1KB
-
Sample
230531-s4dhxagc4z
-
MD5
2e8efc45b3b4fa486e47905faf411e6b
-
SHA1
5dff4a792f82288447c0aad7871d468ba32a77d0
-
SHA256
3adfec6c1c674f1f688cf751a1015179e8a30bd1a7883c32c965f232a51eabc4
-
SHA512
0d45dae3029b4994b9ace13cb0f34c017af73dcc3e433b373abebd37f4a3c46830edce02b0b7da3273fe49fac59eaea406c8035a19ce4293e98bc16b25dd7f51
Static task
static1
Behavioral task
behavioral1
Sample
doc_F825_May_31.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
doc_F825_May_31.js
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
doc_F825_May_31.js
-
Size
4KB
-
MD5
d650c3e659a8e025e53068c21063a405
-
SHA1
b4d356483db32fbadb16ad253e1dd18e40d63911
-
SHA256
710a8ed987f7de59a72fe3d3627661a72ff018331a8152e48449dbd3231eddd9
-
SHA512
fa3a54828fee78220b4076608fa2aff80967e4e4ce3e9cc11d9cac76cd72044a36db357c88a11017d6bcb17f3829c3f79c2ca9c0cb58b012a8a883fb0fda73bb
-
SSDEEP
96:00cIEPFn/UC9Slzgv1i2KUPtcbdFmf02Z3Y3tC:PSqzgN9eqMtC
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-