General
-
Target
0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db
-
Size
34KB
-
Sample
240801-z3cnjswfpl
-
MD5
1a728c2b3c673aed61981cb039c5006f
-
SHA1
fbf6dd8c3b24ca278ee76dc9f54d4c37b28609f0
-
SHA256
0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db
-
SHA512
35a93e3e52d2eaefd4baf12dbe54cc33b2f3b25044c6f3b7b11e0ccb883c975b1e0b01ef331f89cd9d2c2da9f15c4337d7301e5c40985a37e696560881499c06
-
SSDEEP
384:18LDjTPAA6ymev82NsdHLneAjf7OrN6/WgZduE:cDjLR6dev82NsdHLpf76NYW
Behavioral task
behavioral1
Sample
0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db.xls
Resource
win10v2004-20240730-en
Malware Config
Extracted
https://tmpfiles.org/dl/10333590/exploit.jpg
Targets
-
-
Target
0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db
-
Size
34KB
-
MD5
1a728c2b3c673aed61981cb039c5006f
-
SHA1
fbf6dd8c3b24ca278ee76dc9f54d4c37b28609f0
-
SHA256
0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db
-
SHA512
35a93e3e52d2eaefd4baf12dbe54cc33b2f3b25044c6f3b7b11e0ccb883c975b1e0b01ef331f89cd9d2c2da9f15c4337d7301e5c40985a37e696560881499c06
-
SSDEEP
384:18LDjTPAA6ymev82NsdHLneAjf7OrN6/WgZduE:cDjLR6dev82NsdHLpf76NYW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Deletes itself
-