Malware Analysis Report

2025-01-22 15:21

Sample ID 231219-pj7dpscfd2
Target 202d4e7fe3709858f5cb1b5151ca3fcc
SHA256 c8f6ed5f2df6f51cfb2ff02ba43d717da426d61c0a516a2a7346d99cc57405cb
Tags
macro xlm
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

c8f6ed5f2df6f51cfb2ff02ba43d717da426d61c0a516a2a7346d99cc57405cb

Threat Level: Likely malicious

The file 202d4e7fe3709858f5cb1b5151ca3fcc was found to be: Likely malicious.

Malicious Activity Summary

macro xlm

Suspicious Office macro

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-19 12:22

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-19 12:22

Reported

2023-12-19 16:22

Platform

win7-20231201-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-19 12:22

Reported

2023-12-19 16:22

Platform

win10v2004-20231201-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A