Behavioral task
behavioral1
Sample
SHIPPING DOCUMENTS.xls
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENTS.xls
Resource
win10v2004-20230220-en
windows10-2004-x64
24 signatures
150 seconds
General
-
Target
SHIPPING DOCUMENTS.xls
-
Size
1.5MB
-
MD5
518e41c69dec599380cccb991d047e16
-
SHA1
5b061c85b3c5be0079bdc830389f197c059e6f44
-
SHA256
a26cf1908d8e2e9ab6e9b3fdf31d6cb5d58d7035374cd513b459a1541cc2fc79
-
SHA512
b7f0e1f2cdb7edda83180262d4bd138f06a24a9335a4e437903806398dbdd25f4170bfe967b1cf476c73a865db3bffdf31a8957ed2683188e9a1aecaf790c761
-
SSDEEP
24576:w+3bqIKPsoGRwGtt6EaSE8hpaMNzl8raUtGCn113q49zuCr2+zm/E0IEWQNLGBuu:DrtKjG/n6Ead9MNzlMRtGCn113q496CJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
SHIPPING DOCUMENTS.xls.xls windows office2003