Behavioral task
behavioral1
Sample
www.pria.ee_docs_resources_11918.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
www.pria.ee_docs_resources_11918.xls
Resource
win10v2004-20230220-en
General
-
Target
www.pria.ee_docs_resources_11918.xls
-
Size
111KB
-
MD5
47002fba05796d5fdc065c3f43408ff2
-
SHA1
7e0cde5c43aeb137fb0f973717f6c5012c054fbc
-
SHA256
3ce384f7d3f3d832725be4778a7e9119289350f67ce22e8a449b163227b70666
-
SHA512
8a6e21c6031c25913d27417947d669904dd87abe3ba4427cbf0fb40937e2874193bbcb1245e3f74890162654fc5cc945a4b5bb9e9df17c2d02a325f09f0a37a9
-
SSDEEP
3072:VdnFPRnKYqUaAMOwm8m/5DJfxqxFUlhu5NZUHZI/yg/mc6rGSt//+DTJlTibqLgm:VdnFPRnKYqUaAMOwm8m/5DJfxqxFUlhu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
www.pria.ee_docs_resources_11918.xls.xls windows office2003