General
-
Target
wpswireless-invoice-08.11.22.doc
-
Size
2.2MB
-
Sample
220811-st63gaghbj
-
MD5
672ff75cfa223733b4d42382089a57b2
-
SHA1
02dd6b448c2373dc1223724b1ab1aff920528aa6
-
SHA256
aabc9295e27a673dcfb902960b8196a561923cef78ddb061956cb627fcfa782c
-
SHA512
67ae70869362e5f55cec2655cbe924387baed91a0104abfb47ead979aac7b56684af5e5413b305ea1fdaeb5ccd7053e7ff398a341dd2fcc7c8b325f05ac2e272
Static task
static1
Behavioral task
behavioral1
Sample
wpswireless-invoice-08.11.22.docm
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
wpswireless-invoice-08.11.22.docm
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
wpswireless-invoice-08.11.22.doc
-
Size
2.2MB
-
MD5
672ff75cfa223733b4d42382089a57b2
-
SHA1
02dd6b448c2373dc1223724b1ab1aff920528aa6
-
SHA256
aabc9295e27a673dcfb902960b8196a561923cef78ddb061956cb627fcfa782c
-
SHA512
67ae70869362e5f55cec2655cbe924387baed91a0104abfb47ead979aac7b56684af5e5413b305ea1fdaeb5ccd7053e7ff398a341dd2fcc7c8b325f05ac2e272
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-