Behavioral task
behavioral1
Sample
d623cba5765d8c02d118517a8b7613b1.xls
Resource
win7-20220812-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
d623cba5765d8c02d118517a8b7613b1.xls
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
d623cba5765d8c02d118517a8b7613b1
-
Size
46KB
-
MD5
d623cba5765d8c02d118517a8b7613b1
-
SHA1
81d4f63f8e85b3ddfd81bf16701069e3897ef375
-
SHA256
bd6fe38a37a1d7f7c0159b02276afa85e8b5361298375105a6136d34069234e6
-
SHA512
1376c33670488be150f48064c0ba9fb5ce0bee8cc0c3ec2aa3c7ed56a1454dff2ee9fc9f02c953bf4d63a8280087c68464d170304e59ca736762eecd78c57648
-
SSDEEP
768:vwvdzAqk3hOdsylKlgxopeiBNhZFGzE+cLgLg0nAWmNt6mVSoGci/:Utk3hOdsylKlgxopeiBNhZFGzE+cLgLN
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d623cba5765d8c02d118517a8b7613b1.xls windows office2003
Kangatang
ThisWorkbook