General
-
Target
valliant.document.08.11.2022.doc
-
Size
2.2MB
-
Sample
220811-s1wv3shaaj
-
MD5
cadb9d5ed47b8df81a2addefed302a03
-
SHA1
f7197fa991510f99f25af2b502c40d3b48d1abbc
-
SHA256
9cb01729327bd958e32aa9481d5a81303627ab7a59b9ae134fb6600ef4e5b680
-
SHA512
1b5ed9721c8d1aed9d09a850cb43afd6d756bbf6957ca6d8321c1fb5ea89a88a448f0aaa60348a70e30eda299c554619961c89b12888ea2ad6a6a5d058a54b07
Static task
static1
Behavioral task
behavioral1
Sample
valliant.document.08.11.2022.docm
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
valliant.document.08.11.2022.docm
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
valliant.document.08.11.2022.doc
-
Size
2.2MB
-
MD5
cadb9d5ed47b8df81a2addefed302a03
-
SHA1
f7197fa991510f99f25af2b502c40d3b48d1abbc
-
SHA256
9cb01729327bd958e32aa9481d5a81303627ab7a59b9ae134fb6600ef4e5b680
-
SHA512
1b5ed9721c8d1aed9d09a850cb43afd6d756bbf6957ca6d8321c1fb5ea89a88a448f0aaa60348a70e30eda299c554619961c89b12888ea2ad6a6a5d058a54b07
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-