Behavioral task
behavioral1
Sample
PAYMENT_ADVICE_2210008WF.xls
Resource
win7-20220715-en
windows7-x64
8 signatures
150 seconds
General
-
Target
PAYMENT_ADVICE_2210008WF.xls
-
Size
123KB
-
MD5
7eeb6c4c06e2b7f1b61dcbcc5ed1cf2f
-
SHA1
77d637d3c716cbc95626efb9483bc9e39d34e765
-
SHA256
4f3eca65d342de5bb3f92364f8639d1c492d450cdeff7e69583a198e3ade465c
-
SHA512
7983cc21f3203999f315c6ea1ebf30e47903624fb830aaf253234d69f62212134c3bc4cbd2ebe6ba55ea4df91680522b4019142ca3612dcb3b5a76681642cc0f
-
SSDEEP
3072:4Otk3hOdsylKlgxopeiBNhZFGzE+cL2kdAbmFE22J6huph+ZALuohwlCWsf:4Otk3hOdsylKlgxopeiBNhZF+E+W2kd2
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
PAYMENT_ADVICE_2210008WF.xls.xls .js windows office2003