General
-
Target
document-1499051934.xls
-
Size
331KB
-
Sample
201126-qyfm8cf4rn
-
MD5
cebf078d349bce63bc7e01a860db8775
-
SHA1
cab94bba6a539a28d37f71907317463eafa8ec2c
-
SHA256
42e22270ccc9af5dcbd5aa0d666dffd2fa2ba1ec4a2e81b17fc2e37d41f78a16
-
SHA512
e8a8d220f06c00d3fdcbe7ff01e8e382e018d5bbdf0add2a709f43f8e8b2991b1b13289a4127c6e1ba5eee52a87c61bd02413787dfae5d40bc0878c5af10bdfe
Static task
static1
Behavioral task
behavioral1
Sample
document-1499051934.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1499051934.xls
Resource
win10v20201028
Malware Config
Targets
-
-
Target
document-1499051934.xls
-
Size
331KB
-
MD5
cebf078d349bce63bc7e01a860db8775
-
SHA1
cab94bba6a539a28d37f71907317463eafa8ec2c
-
SHA256
42e22270ccc9af5dcbd5aa0d666dffd2fa2ba1ec4a2e81b17fc2e37d41f78a16
-
SHA512
e8a8d220f06c00d3fdcbe7ff01e8e382e018d5bbdf0add2a709f43f8e8b2991b1b13289a4127c6e1ba5eee52a87c61bd02413787dfae5d40bc0878c5af10bdfe
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-