General
-
Target
b40d48738327522cc83e7f75381f73e5
-
Size
306KB
-
Sample
240305-hjwhwahg74
-
MD5
b40d48738327522cc83e7f75381f73e5
-
SHA1
c9f746b460f554d5f5e4ad61aeae268ea94b66fc
-
SHA256
bf304c534a5f19a125487f4864bb17ff0c00d2f09e3620c1ab18e637a5ad04cc
-
SHA512
6a79143227fa90a0bb49025e22d6a12007805b27dd6763b0c18a5d9415fdd940cec35a6ff0c126c6c1ad5304d7874f0e266a24ba626947d5cd6622fa1c435be4
-
SSDEEP
6144:S8NSLcq+YXEsRp9uvB17fruVRDNsie5rVELDvc8DbEKUacRB:JPYXEsRWr7KVRDmVExP+acRB
Behavioral task
behavioral1
Sample
b40d48738327522cc83e7f75381f73e5.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b40d48738327522cc83e7f75381f73e5.xlsm
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
b40d48738327522cc83e7f75381f73e5
-
Size
306KB
-
MD5
b40d48738327522cc83e7f75381f73e5
-
SHA1
c9f746b460f554d5f5e4ad61aeae268ea94b66fc
-
SHA256
bf304c534a5f19a125487f4864bb17ff0c00d2f09e3620c1ab18e637a5ad04cc
-
SHA512
6a79143227fa90a0bb49025e22d6a12007805b27dd6763b0c18a5d9415fdd940cec35a6ff0c126c6c1ad5304d7874f0e266a24ba626947d5cd6622fa1c435be4
-
SSDEEP
6144:S8NSLcq+YXEsRp9uvB17fruVRDNsie5rVELDvc8DbEKUacRB:JPYXEsRWr7KVRDmVExP+acRB
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-