Behavioral task
behavioral1
Sample
PO-10521018 Amendment 04 dated --.07.2022 - TAIKAI.xls
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PO-10521018 Amendment 04 dated --.07.2022 - TAIKAI.xls
Resource
win10v2004-20230703-en
General
-
Target
PO-10521018 Amendment 04 dated --.07.2022 - TAIKAI.xls
-
Size
39KB
-
MD5
30815b255690ba7038ee66e5fd9515fa
-
SHA1
59ce2dc4964fcc4950642bc970afe1c191bdc9c9
-
SHA256
7c072e0cece37868b70728a2129a37905e2cbf4a4e09d0eb52b024743d6dfafa
-
SHA512
dbff5a14b714373b7e1a7b1e55eb0d2f2f5bbc478201f52150359c33d88d8f84409995b5d1539731d058f8bb48fdc120105506edfedceb74305deeb43a941382
-
SSDEEP
768:FPjk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJJmbyST7XNG30BP+a4FsYTTA:tjk3hbdlylKsgqopeJBWhZFGkE+cL2NG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
PO-10521018 Amendment 04 dated --.07.2022 - TAIKAI.xls.xls windows office2003