Behavioral task
behavioral1
Sample
CITIREMITTANCEADVICE.xls
Resource
win7-20220715-en
windows7-x64
8 signatures
150 seconds
General
-
Target
CITIREMITTANCEADVICE.xls
-
Size
119KB
-
MD5
2057c566db6fb1532e9bee1cdab7f018
-
SHA1
ac672abfc153fdabcbb1f1ffa149dc98e05e7c72
-
SHA256
9b0ac9fff5a7bf388a5921f555f31d9d6004901b62ed0d1da9eb0b19e04cbc46
-
SHA512
9e083e11b5fef981ce0234553ea8b61a0ccd264e03d6afab47242c6046e18bb665d24c5a604f7772dbf21ef3d6b0c0bb3bb70d16d08705a8b9e513ad3ef32df1
-
SSDEEP
3072:hONk3hOdsylKlgxopeiBNhZFGzE+cL2kdARt9qwi+o3nM6dW9Ns7ysu:hONk3hOdsylKlgxopeiBNhZF+E+W2kd3
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
CITIREMITTANCEADVICE.xls.xls .js windows office2003