Behavioral task
behavioral1
Sample
Order MGE-PO-2022-027.xls
Resource
win7-20220812-en
windows7-x64
7 signatures
300 seconds
Behavioral task
behavioral2
Sample
Order MGE-PO-2022-027.xls
Resource
win10v2004-20220812-en
windows10-2004-x64
19 signatures
300 seconds
General
-
Target
Order MGE-PO-2022-027.xla
-
Size
114KB
-
MD5
42d05295b18da2d31022f2085f62c1c7
-
SHA1
0e9a4618e0fc737f52300d27f33af614bfbeb7bf
-
SHA256
0755a10bbe45ec010a16f32e842c65be350eed0eb4b0e7cb1e2794986a34abb4
-
SHA512
7c16d8daab58dd5bffa3ef23a1fe9fdb2087b3dbd41afdf20d5e132581787ed4b027bcea2cb8ab3bb2906cde2363021a965e96a5b40a185664783286b6119974
-
SSDEEP
3072:3eGk3hOdsylKlgxopeiBNhZFGzE+cL2kdAVVmF5nNUHukBva5UBmglG:3eGk3hOdsylKlgxopeiBNhZF+E+W2kdp
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
Order MGE-PO-2022-027.xla.xls .xla windows office2003