General
-
Target
43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13
-
Size
165KB
-
Sample
240819-htnk1stdkm
-
MD5
5f71bb635bdaa4ba48a9ac0b24b10e0f
-
SHA1
e0660c41702dbeb2b3092a95edf7ed6ce2a44742
-
SHA256
43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13
-
SHA512
5d09707cce81ed71addef88818c60232c9a3427925f35f7f350b20c5d4c62db1648a76516231e115266d119c118a7e15e7ba736d1d0fda9b8dbcc3c5cb9a85e8
-
SSDEEP
3072:3DYpmZjeGPLJgJdK/9ahoueCm/V6jP1XHsJOmqdZgox+F/1tNmBT9:zY0TmzKQeV/V6b9tghF/Bc
Static task
static1
Behavioral task
behavioral1
Sample
43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13.xls
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13
-
Size
165KB
-
MD5
5f71bb635bdaa4ba48a9ac0b24b10e0f
-
SHA1
e0660c41702dbeb2b3092a95edf7ed6ce2a44742
-
SHA256
43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13
-
SHA512
5d09707cce81ed71addef88818c60232c9a3427925f35f7f350b20c5d4c62db1648a76516231e115266d119c118a7e15e7ba736d1d0fda9b8dbcc3c5cb9a85e8
-
SSDEEP
3072:3DYpmZjeGPLJgJdK/9ahoueCm/V6jP1XHsJOmqdZgox+F/1tNmBT9:zY0TmzKQeV/V6b9tghF/Bc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Evasion via Device Credential Deployment
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-