General
-
Target
document_D874_Jun_1.zip
-
Size
1KB
-
Sample
230601-sv5wssfd4v
-
MD5
6673a34a64660158686a56f8dcf9a5fb
-
SHA1
82d506997a3fa6eaa8f52066d4f208d5b4dda2cd
-
SHA256
16a597b4fb6dd4d55f5c544c3ab6c06aab4711ddeabf71146754a268f9ea48f8
-
SHA512
5ab70e4a72173da96327e9427e7674a468e1789b2204513826e7f5fc82443708022df507fbb4f05d5d653482d0a0d27c920fffced84a9a452c56aed9334a1250
Static task
static1
Behavioral task
behavioral1
Sample
document_D874_Jun_1.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
document_D874_Jun_1.js
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
document_D874_Jun_1.js
-
Size
5KB
-
MD5
f23b307aa9c2f4e7b12390248b892667
-
SHA1
97d4f53a0b91e049f7b59785777aa7ab679a52fe
-
SHA256
69f3aa2db0d3fb0c8bcc2c1a0ff90e4cfb62558eed7cef195c2d5ba0ed18aa8e
-
SHA512
fc61588a4e8898367f2aef7cbdc91dfce2b0913263687956bf0699906aad75ac6f790f692ae4fae442b4c48941294d24293d18aec8add5947664c9fff6e50f3f
-
SSDEEP
96:OleiTFtf7yLH4JfO4Jy0ealsvW1vHduGFmS8J+x:JevCYZZHjf2+x
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-