General
-
Target
e4454c0038cd23ee5b4b082d88097f7c74b23b0d2b098b48b04228d081bdc671
-
Size
134KB
-
Sample
240515-cp2desce2v
-
MD5
b1900ea0e41925813c51e507236f43d7
-
SHA1
1fbb006fdfa003e1e85fe92449e17ff2761fc8b6
-
SHA256
e4454c0038cd23ee5b4b082d88097f7c74b23b0d2b098b48b04228d081bdc671
-
SHA512
c7d5398ddb77b334aefa72e75e937bda8c12e57eac0a8d1883fe804b61bf0c86d67876665215ac4c9eab02427f397687a90e8fc11c129deeddfb816cc3caf806
-
SSDEEP
3072:q2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmMRfV:q2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3t
Behavioral task
behavioral1
Sample
e4454c0038cd23ee5b4b082d88097f7c74b23b0d2b098b48b04228d081bdc671.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e4454c0038cd23ee5b4b082d88097f7c74b23b0d2b098b48b04228d081bdc671.xls
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
e4454c0038cd23ee5b4b082d88097f7c74b23b0d2b098b48b04228d081bdc671
-
Size
134KB
-
MD5
b1900ea0e41925813c51e507236f43d7
-
SHA1
1fbb006fdfa003e1e85fe92449e17ff2761fc8b6
-
SHA256
e4454c0038cd23ee5b4b082d88097f7c74b23b0d2b098b48b04228d081bdc671
-
SHA512
c7d5398ddb77b334aefa72e75e937bda8c12e57eac0a8d1883fe804b61bf0c86d67876665215ac4c9eab02427f397687a90e8fc11c129deeddfb816cc3caf806
-
SSDEEP
3072:q2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmMRfV:q2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3t
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-