Behavioral task
behavioral1
Sample
PO20230247.xla.xls
Resource
win7-20230220-en
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
PO20230247.xla.xls
Resource
win10v2004-20230220-en
21 signatures
150 seconds
General
-
Target
PO20230247.xla.xlsx
-
Size
41KB
-
MD5
ff8ff717216939449fa5f8c656da3e0b
-
SHA1
15761dd150a0bdf702fc27aa4fccd0ff19168f63
-
SHA256
2b4b71b54f825d8b95aabc0a9097d390523781be85f1e57cd05f6aa7687bfded
-
SHA512
ab42ad8960fb7bfd75083392e7aef5b9a4ef264ea9d699012256c50cffd7f37e96181ff58804c4881f5c56d2d8dfffce7e9af3d1e1e6887fd41ad2122616e442
-
SSDEEP
768:KoPk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJD18XmbPWtjPhm8CC+pUp:nPk3hbdlylKsgqopeJBWhZFGkE+cL2ND
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
PO20230247.xla.xlsx.xls .ps1 windows office2003