Behavioral task
behavioral1
Sample
4b64c7e33545086f4bdf149b8b56111a.xls
Resource
win7-20221111-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b64c7e33545086f4bdf149b8b56111a.xls
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
4b64c7e33545086f4bdf149b8b56111a
-
Size
140KB
-
MD5
4b64c7e33545086f4bdf149b8b56111a
-
SHA1
2331e5f6ccd876773d43bf51233128ad4842fff0
-
SHA256
3f9bf5c1aef9f2ca7a5eb6c5ec61ff1e0d73b91b2f30d2f021b4dc0830d1aff9
-
SHA512
ae2288509bb340b680a671fca73871a15e5fab612c816bf891e0e9de89cbf84d712cb760a16927ffff77e6602dd26fb1d7236cc8315e4abf1a37e6cc20fc108d
-
SSDEEP
1536:V0pf31nPejezeneyeVe9enekdxDkebcHejezeneyeVe9enekdxDkebcUyyQrKiCG:O9vyQrO1w3Pqh+duRKvWbbq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4b64c7e33545086f4bdf149b8b56111a.xls windows office2003
Kangatang