Behavioral task
behavioral1
Sample
63e7d413f4653c4b84c8e4c1c4fd4516a245464b3e996aa733ce21c9c1c964b1.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
63e7d413f4653c4b84c8e4c1c4fd4516a245464b3e996aa733ce21c9c1c964b1.xls
Resource
win10v2004-20230915-en
General
-
Target
968a96fab78010b987e7a0b8624d2605.bin
-
Size
76KB
-
MD5
a5ce517409c0d487ed66af9deee7828b
-
SHA1
f6493ed920e7c684e892cc727634f4a4d0e046b3
-
SHA256
eb22343d63c248487567ff4bef56e8fffe8b697db336180360f41cb0d522b9ba
-
SHA512
149ccce9ea0791963b98f91e8976cf949778a2529cd6ffb9530945fe5256751c36777802a55259fac13bc6e836948307a51f1c567d5bc731a49f96df71421f10
-
SSDEEP
1536:ddbcmWPKO/zCFoxP0Y1mJMe8mNsG1AwZXpVm0RExzodGPkeP:zb7rOrCFeP0GW8mNRhhtpdMkeP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/63e7d413f4653c4b84c8e4c1c4fd4516a245464b3e996aa733ce21c9c1c964b1.xls office_macro_on_action -
resource static1/unpack001/63e7d413f4653c4b84c8e4c1c4fd4516a245464b3e996aa733ce21c9c1c964b1.xls
Files
-
968a96fab78010b987e7a0b8624d2605.bin.zip
Password: infected
-
63e7d413f4653c4b84c8e4c1c4fd4516a245464b3e996aa733ce21c9c1c964b1.xls.xls windows office2003
ThisWorkbook
Sheet1