General
-
Target
PO 17265 SCB.xlsx
-
Size
2.0MB
-
Sample
240508-gnzweseb4v
-
MD5
272a0766164131b5cd9b1b2948ac9cf1
-
SHA1
b26064a6b37caba89186a80273920120752d5e1f
-
SHA256
93f5f2d4ff775373e7154402ba6adf105ce6693f2b6fa0cb5db3e03fb4ac1657
-
SHA512
b467fa31df3fe1f4b05d9ed9d3a367b2aa1077a0a31471d352c4afba1358593b3f6c697bd4fd96f6a2fc077844211ca313bb82c634492255a594d679e714c91a
-
SSDEEP
49152:ucIsFFXdV0iAdTw7Zqm/So5C13+i3oK5zgZVdY:u1aFrwdEv/S13oAx
Static task
static1
Behavioral task
behavioral1
Sample
PO 17265 SCB.xlsx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO 17265 SCB.xlsx
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
PO 17265 SCB.xlsx
-
Size
2.0MB
-
MD5
272a0766164131b5cd9b1b2948ac9cf1
-
SHA1
b26064a6b37caba89186a80273920120752d5e1f
-
SHA256
93f5f2d4ff775373e7154402ba6adf105ce6693f2b6fa0cb5db3e03fb4ac1657
-
SHA512
b467fa31df3fe1f4b05d9ed9d3a367b2aa1077a0a31471d352c4afba1358593b3f6c697bd4fd96f6a2fc077844211ca313bb82c634492255a594d679e714c91a
-
SSDEEP
49152:ucIsFFXdV0iAdTw7Zqm/So5C13+i3oK5zgZVdY:u1aFrwdEv/S13oAx
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-