Behavioral task
behavioral1
Sample
top.pps
Resource
win7-20230220-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
top.pps
Resource
win10v2004-20230220-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
top.ppa
-
Size
107KB
-
MD5
ce4c22fb1f1d83002fdb009744fc1b89
-
SHA1
5c07aa807a91f10466116398b1229a21e717b577
-
SHA256
125d1d308f8413f06a1b3de8537f7aa5d7d1951c97b8e5229d14367eb05b325a
-
SHA512
994813803016204719dca6091b7817c649488490e5bbb1531a12b2c3fac973e01d17358da3f2ad9d4f8ed0fdb97aa4a5dcf986e93e137ab87fd6e49310760712
-
SSDEEP
768:zLnjq8i2s5xgumn7PWY7k75SMkG9XEut6DqQ2TOG:HG8Ds5WJnygk/9XgDqQ2
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
top.ppa.pps .ppa windows office2003
WOååéíåËsAaËéåéêòfOôIOiòéOfìæí