Behavioral task
behavioral1
Sample
4a7daa6f01efcbc7e6480e26f2f99092eb7c059929bc84debd13a7962d0a2a25.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4a7daa6f01efcbc7e6480e26f2f99092eb7c059929bc84debd13a7962d0a2a25.xls
Resource
win10v2004-20230915-en
General
-
Target
100a2750f01f084234fbd828f1f608fc.bin
-
Size
76KB
-
MD5
8aceb27f6eacef119dbb3488a0f4d70f
-
SHA1
c4ad73465cab55cbb44ff7fdc7669123283f3c2c
-
SHA256
8e2e26b08aa3e47e74aae7da4bb71beeb6d3dc9d962baeac953e020a41f07067
-
SHA512
7c4e384908f06999ad23406e817b7ac1b907096050f042da6c08ebba04e3866ad472fd9e6ab0acb9b80f5eb078b23bab64c59ac5334f55a316fc1484365df5af
-
SSDEEP
1536:wBm8iUU5lKpEkosf/lube2517Ph5jnx2rwFEDdTG6/u4buZ0N0xTkrj:NT6ako1l7JJn/SlGP4A0NUkrj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/4a7daa6f01efcbc7e6480e26f2f99092eb7c059929bc84debd13a7962d0a2a25.xls office_macro_on_action -
resource static1/unpack001/4a7daa6f01efcbc7e6480e26f2f99092eb7c059929bc84debd13a7962d0a2a25.xls
Files
-
100a2750f01f084234fbd828f1f608fc.bin.zip
Password: infected
-
4a7daa6f01efcbc7e6480e26f2f99092eb7c059929bc84debd13a7962d0a2a25.xls.xls windows office2003
ThisWorkbook
Sheet1