Static task
static1
Behavioral task
behavioral1
Sample
Notification #591501.xls
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Notification #591501.xls
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
Notification #591501.xls
-
Size
790KB
-
MD5
e004ebdc104e70001d0d1453ccbbf7a8
-
SHA1
35f4b94344109eb3245c653277e3b41e0d5277de
-
SHA256
1920c8c809d225ed5239f9aa0c510148a6b292d639e9d2ab13146129d255f3c1
-
SHA512
2404f047e176aefd57234009a588c01b97ac263ebefc06a3e55e55ea13267eceb5b00b0a62a643701b23d06f77f529b80a11801c08e283210b25594a00489e9a
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
Notification #591501.xls.xls windows office2003
ThisWorkbook
Sheet1
JMLjL_9Tr_ykY
MBZZD_gk7r_9hU
L13wmJr7O
E0HRI1ZDBGGDG
MLO5_90h
Jm6OBrAeP30eZf6
OLddK_44Bs_U0CI_47ul
LOoa1_Izzn_Ggb_cNed
PABGRG0bpp1t
HDRET_DXU_w2M