Static task
static1
Behavioral task
behavioral1
Sample
Notification_71823.xls
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Notification_71823.xls
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
Notification_71823.xls
-
Size
724KB
-
MD5
d65ddb3ade34504d44e72ba9db953916
-
SHA1
8bcccc3bce9568919160024dbc3144de359f2d5f
-
SHA256
83386fb9fa084ea2de1f106d155a819b8090f95c28ed7a0f3c9756910bcedc5b
-
SHA512
60d7a503c24c3b324c185f7010642e874271d759ff58fd0dcc7184683d6c1d3a2e322f19d26f04174ac14fe6a96f97f13fcfde16bd74ab72ed29d30ecb0d198d
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
Notification_71823.xls.xls windows office2003
ThisWorkbook
Sheet1
dunfJJILTT6eUjJf
KDe8h_JiI
NAg9x8vbNeJcBpc3
Lj8QZ_nlq_B7gs_gx1D
HKd02_U6f_k2or_Z3Nc
PzY5w5NCibWzBGyR
XEaecO2
W3lWSRc