Behavioral task
behavioral1
Sample
PURCHASEORDER.xls
Resource
win7-20230220-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
PURCHASEORDER.xls
Resource
win10v2004-20230220-en
15 signatures
150 seconds
General
-
Target
PURCHASEORDER.xls
-
Size
1.5MB
-
MD5
7128d7e3632afbc109085c91fd0404c1
-
SHA1
4b16b615630468c252d3f642995a4d5d9c252e6b
-
SHA256
33497120ede69ba4d6c9c7bb4533ec7ece887acfa9ed2d617a215ff81126b46e
-
SHA512
5eccb89ed4479f7040ddf1582bbdb569c0f571337892e34fb0ff3151dee663f255e252f9886288b7ee31366df70d52f5a6c9f9163cda7db3fff1a2a4e275446a
-
SSDEEP
24576:X2Tbq8KPsUGRoG1t6EWOEMhpaMNzl8raUtGCn113y4RzuCr2izm/EcUAbFNLGeuX:mv5K/G3v6EWxNMNzlMRtGCn113y4RaCw
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
PURCHASEORDER.xls.xls windows office2003