Behavioral task
behavioral1
Sample
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d.xls
Resource
win10v2004-20230915-en
General
-
Target
6d28bfe2447e21a17a61dcbf695a7da0.bin
-
Size
32KB
-
MD5
a14d5db799b13bc1ad92e2da2a9248b9
-
SHA1
9a81b2e12a23e0b1f35fe57c427d01dffd537895
-
SHA256
1c0aea52525e5d815642253314b6d1afd880b883bf58d3883ce3e9ee606ae0aa
-
SHA512
f5e198475290eb218b9b3a00f26535db65c1baf8e4f822ffe2b4be3a8fd66cf8b604bce4e103f886d3a7431d7e006aa36802b0560696c35decf96faca0fcbb98
-
SSDEEP
768:4amjbh0Qawp6/kKdA88D1g2tIFScpFnHLGKa:ml0QVE968i1g2tIF1PnHLGB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d.xls office_macro_on_action
Files
-
6d28bfe2447e21a17a61dcbf695a7da0.bin.zip
Password: infected
-
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d.xls.xls windows office2003