Behavioral task
behavioral1
Sample
P.O #306078910.xls
Resource
win7-20220812-en
windows7-x64
19 signatures
150 seconds
Behavioral task
behavioral2
Sample
P.O #306078910.xls
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
P.O #306078910.xls
-
Size
548KB
-
MD5
4d0c7f86b0e57066396f5a7b96eb1a49
-
SHA1
c8e04472398c857cc8eb9b20295a41eb151ea8c4
-
SHA256
a3d6bb9bcec84d97233aefc0f3fa839119d1a9af04581c7874e07b1292dcd7a4
-
SHA512
00149978b7189a4416c28d21686316d00324b3704a1b100b1f5257141c8353a13615f280b8d70bbdc7faa6429f3447768e121cde9a611322df2a6f808bc6dd70
-
SSDEEP
6144:yaFJkKXiDU7wo6cyBpezcOPqGjZ+RwPONXoRjDhIcp0fDlavx+W26nAKC0LHAV0J:yaFiKXKPcyBpezBZDDDAGQm78JU68
Score
5/10
Malware Config
Signatures
-
Document created with cracked Office version 1 IoCs
Office document contains Grizli777 string known to be caused by using a cracked version of the software.
Processes:
resource yara_rule sample grizli777_cracked_office
Files
-
P.O #306078910.xls.xls windows office2003