Behavioral task
behavioral1
Sample
c9ae9e6bed2bf50de1a90e3590e53926bd7618c4b120eb389df3e7b6ffa752eb.xls
Resource
win7-20230831-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
c9ae9e6bed2bf50de1a90e3590e53926bd7618c4b120eb389df3e7b6ffa752eb.xls
Resource
win10v2004-20230915-en
windows10-2004-x64
5 signatures
150 seconds
Errors
Reason
office: non-rc4 encrypted document not supported
General
-
Target
12123711409.zip
-
Size
1.6MB
-
MD5
f03110bb7cb4933d12f68eb6429d4030
-
SHA1
9b5a9252aef52ba590c80194bbbfd5fa8d1f3eb1
-
SHA256
a8bcfe818b0aba859b37105111d947604d0739aca1ee35754b1c45da178eb59b
-
SHA512
c6c6c0d08e1594f1369555571f2367786521ef85f7aca6aaa5dc85b6ab56de81e3243223ff9af9431987802e89887fe3a4d9e50248d80276dfd1d2eadee18ec8
-
SSDEEP
49152:WjrWrg+g1ZldPQI7TPKH3WhqmQuoP88mo:KXh7ltrPO3tms88J
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/c9ae9e6bed2bf50de1a90e3590e53926bd7618c4b120eb389df3e7b6ffa752eb office_macro_on_action
Files
-
12123711409.zip.zip
Password: infected
-
c9ae9e6bed2bf50de1a90e3590e53926bd7618c4b120eb389df3e7b6ffa752eb.xls windows office2003