Behavioral task
behavioral1
Sample
aa4b26ffd872a1fa3716dbde1d84c2bb.xls
Resource
win7-20220901-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
aa4b26ffd872a1fa3716dbde1d84c2bb.xls
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
aa4b26ffd872a1fa3716dbde1d84c2bb
-
Size
83KB
-
MD5
aa4b26ffd872a1fa3716dbde1d84c2bb
-
SHA1
49ff86e60f09558a04e9c16be6c169059029bb39
-
SHA256
337410b560556a848aa64df9703215cd5884de86e863a0afc2046bae1ce4218b
-
SHA512
d600068b279ab93d5d7c301fa269731f94ed63724f8f2be8530c43a78d0af329c2a3c576ce78212045e94809c6bb6c39265b2ec7f10e5390dc2822d4b5b82124
-
SSDEEP
1536:xdxEtjPOtioVjDGUU1qfDlaGGx+cLgLI0dA+p07ClQ/MvWHcbCriJ65sbCLmRKrl:xdxEtjPOtioVjDGUU1qfDlaGGx+cLgLa
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
aa4b26ffd872a1fa3716dbde1d84c2bb.xls windows office2003
Kangatang
ThisWorkbook