Behavioral task
behavioral1
Sample
986f079a4cfbf1a1de688c8853a0100f5b1178f734d6af75cbd97276e175b800.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
986f079a4cfbf1a1de688c8853a0100f5b1178f734d6af75cbd97276e175b800.xls
Resource
win10v2004-20231215-en
General
-
Target
986f079a4cfbf1a1de688c8853a0100f5b1178f734d6af75cbd97276e175b800.zip
-
Size
686KB
-
MD5
7993a070b05836b881940f1de6d5f216
-
SHA1
fef2ef0dfacbfd5c4a7baebc9f04c1e3cafa4c6b
-
SHA256
71045c1dcb51d1b3139675291ea0448fdd2a7e677eaa332dd78140769612ef95
-
SHA512
90699ca66f1fc1f3e250494e29b5183663a9c85b1daa3f77b022a1dde10f04ba5a7f2254d81da6d125508b8d318c5808193cbf28431ecdbfad4ca52d0f0658a7
-
SSDEEP
12288:ryYjLbhoUSbztogzI110ZkpCeoXR2ltTL+DKtENoERZzIl9Muvnrp0bGxD:Tf4zuUIr0/e2MVL2SARZzIMuvnrjD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/986f079a4cfbf1a1de688c8853a0100f5b1178f734d6af75cbd97276e175b800.xls office_macro_on_action -
resource static1/unpack001/986f079a4cfbf1a1de688c8853a0100f5b1178f734d6af75cbd97276e175b800.xls
Files
-
986f079a4cfbf1a1de688c8853a0100f5b1178f734d6af75cbd97276e175b800.zip.zip
Password: infected
-
986f079a4cfbf1a1de688c8853a0100f5b1178f734d6af75cbd97276e175b800.xls.doc .xls windows office2003
ThisDocument
ExtCollection
frmAbout
frmConfigTables
frmEditVariables
frmHelpID
frmMedTraceSettings
frmReqKey
frmReqRea
frmRiskEvaluation
frmUpdateFieldError
mbReqKeyReqRea
mbCommandBar
mbConfigTables
mbCoverPage
WordWrapper
mbCV_RiskEvaluation
mbEditVariables
ViewResetter
mbWindowsAPI
mbGlobalFunctions
mbHelpID
mbFunctions
mbImportData
mbInitDocument
mbReviewReport
mbCV_RiskClass
mbUpdateFields
mbCodeReview
mbNormal
mbReviewReport1
mbMedTraceOutput
mbProperties
mbSortTorAndTorr
mbUncName
mbGlobalDefinitions
mbHelpLinks
mbInsert
mbMenus
mbLandscape