Behavioral task
behavioral1
Sample
ce77fa16a137ff7f7e1494a37715467f6a80797c0b8962cffd6d6f7e2ce4e4a1.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce77fa16a137ff7f7e1494a37715467f6a80797c0b8962cffd6d6f7e2ce4e4a1.xls
Resource
win10v2004-20220812-en
General
-
Target
ce77fa16a137ff7f7e1494a37715467f6a80797c0b8962cffd6d6f7e2ce4e4a1.xlsx
-
Size
777KB
-
MD5
1c8db552adab7153cf180960e2081ce0
-
SHA1
93a17f2d9b862b157d81fe71183aefc4185b468b
-
SHA256
ce77fa16a137ff7f7e1494a37715467f6a80797c0b8962cffd6d6f7e2ce4e4a1
-
SHA512
18f624842e7cfd52937611886aa70e82b12119157e0f215c67e2ced39b66c7190375b270a80b62237aaad0d6f2db712ce6c31ab316db7ad7b2ddd4489b905429
-
SSDEEP
6144:adO65ozyMC4axoqU8DYyScyAKyFLfT/PrDzT/LP/Drh3LXrD/PrXD3DrP/9rfD3e:D
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ce77fa16a137ff7f7e1494a37715467f6a80797c0b8962cffd6d6f7e2ce4e4a1.xlsx.xls .xlsx windows office2003
Kangatang
ThisWorkbook