Behavioral task
behavioral1
Sample
Payment Advice.xls
Resource
win7-20220812-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Payment Advice.xls
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Payment Advice.xls
-
Size
124KB
-
MD5
873c90af6836b2ad3cce748e99d1b0bd
-
SHA1
266f7f7ac7890227852a996d5f71bf09483616df
-
SHA256
9465c35c652271b12b696f88d353149641b74c354d955753e10ee14424e84f88
-
SHA512
e52eeebb1997b795331fac921dee3e831bd1cc44a73921e2bc5454bb56e3b68f7313aa90fc8bf8519e0afc1fff68ae5850dcfa8e2d2bdc404dd5e9774878d071
-
SSDEEP
3072:Mk3hOdsylKlgxopeiBNhZFGzE+cL2kdAJbE22h6hu5LmZADuohIliIsz:Mk3hOdsylKlgxopeiBNhZF+E+W2kdAKV
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
Payment Advice.xls.xls .js windows office2003