General
-
Target
docs_06_30_2022.xlsb
-
Size
58KB
-
Sample
220630-yqy6cacef5
-
MD5
f391b6abfa46df66449a0446f80d4168
-
SHA1
ef875d0ed399227b6a549c150f2d7f881096f303
-
SHA256
1fc6bed3f1f9a03513cff88ce3d523852565812a75874800add07b4a2efe870b
-
SHA512
6ac260767d721f91aaa5e3e0f04e8f2270572c4db3fa7942153776d93bc12c79a69adb7a7da1eea1fff8d4ed7c9c001a3eb675035bbafb0fdaba2dd5b82ddcdd
Static task
static1
Behavioral task
behavioral1
Sample
docs_06_30_2022.xlsb
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
docs_06_30_2022.xlsb
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
docs_06_30_2022.xlsb
-
Size
58KB
-
MD5
f391b6abfa46df66449a0446f80d4168
-
SHA1
ef875d0ed399227b6a549c150f2d7f881096f303
-
SHA256
1fc6bed3f1f9a03513cff88ce3d523852565812a75874800add07b4a2efe870b
-
SHA512
6ac260767d721f91aaa5e3e0f04e8f2270572c4db3fa7942153776d93bc12c79a69adb7a7da1eea1fff8d4ed7c9c001a3eb675035bbafb0fdaba2dd5b82ddcdd
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-