Behavioral task
behavioral1
Sample
Invoice-N192793.xls
Resource
win7-20220812-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoice-N192793.xls
Resource
win10v2004-20220901-en
12 signatures
150 seconds
General
-
Target
Invoice-N192793.xls
-
Size
102KB
-
MD5
a88329a0eca1ff4a5d59dd6270d08267
-
SHA1
a812bbcb57431be5b0d436590ae4a53465bb1e25
-
SHA256
bf57ecd7a6c0166dd27f311cebda08ed8e9305cfaa66fe68131ba29250ba94f3
-
SHA512
a7bc77709e943d92af345073f639a54d195258020bf5b7ca178eae6b7c90a1d984f2af660aa6e5112ec8389ff0dd27493244e22540acc3ae80ac7792fe066ec5
-
SSDEEP
3072:4k3hOdsylKlgryzc4bNhZFGzE+cL2knAk6vy/sUeo0JSpfiXa:4k3hOdsylKlgryzc4bNhZF+E+W2knAj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
Invoice-N192793.xls.xls windows office2003
ThisWorkbook
Sheet1