Behavioral task
behavioral1
Sample
b63ce45eae52a9c6771f15eb7d2d8a22.xls
Resource
win7-20221111-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
b63ce45eae52a9c6771f15eb7d2d8a22.xls
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
b63ce45eae52a9c6771f15eb7d2d8a22
-
Size
54KB
-
MD5
b63ce45eae52a9c6771f15eb7d2d8a22
-
SHA1
3d531884210333d4930fdac19b48c0eb6e1851b8
-
SHA256
7f804a60f737d32a2f312635fafa6eac4e89f6161598498c8c44d6180868bfe0
-
SHA512
46f79d608a427838b992b27791b1c71bf459b8e3c32cc8d1029d3f11f11220deb84d80e18cd65fe4b8ff8d7809e25e9940de41ced70cf9d64b1817794dc20a55
-
SSDEEP
1536:Yaaqy3xEtjPOtioVjDGUU1qfDlaGGx+c46gHAwERMVmxb2cBhk+:5mxEtjPOtioVjDGUU1qfDlaGGx+c46gI
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b63ce45eae52a9c6771f15eb7d2d8a22.xls windows office2003
Kangatang
ThisWorkbook