Behavioral task
behavioral1
Sample
d53533af17c59740a5d3a823c6457074ac934705f41a174790d4edfbaa00fe38.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d53533af17c59740a5d3a823c6457074ac934705f41a174790d4edfbaa00fe38.xls
Resource
win10v2004-20240226-en
General
-
Target
d53533af17c59740a5d3a823c6457074ac934705f41a174790d4edfbaa00fe38.zip
-
Size
685KB
-
MD5
6773085e0a360536e4d30d653a80b902
-
SHA1
91a0deaa02b6aa118b608bef22d9b25102eca251
-
SHA256
0f96c76876ad4a4fc2f511c5e488cafe0d8a06965e13f97113e237daae25eede
-
SHA512
0de78eb5d71a08bf75fc6eebe29c11f27736a339002409c2f86abaad1c5da7ae374ba3a883920a1bfeaafe54384c70117c4a176b94ea8374a37f792450c51267
-
SSDEEP
12288:ILoU0D4scwRJ14DdaHmJ72y1N/RhQKoTyVIVSlDuRl4fTsIIPgJCq6kKy:HlEsFChNsgNVxgRlAsFdhy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/d53533af17c59740a5d3a823c6457074ac934705f41a174790d4edfbaa00fe38.xls office_macro_on_action -
resource static1/unpack001/d53533af17c59740a5d3a823c6457074ac934705f41a174790d4edfbaa00fe38.xls
Files
-
d53533af17c59740a5d3a823c6457074ac934705f41a174790d4edfbaa00fe38.zip.zip
Password: infected
-
d53533af17c59740a5d3a823c6457074ac934705f41a174790d4edfbaa00fe38.xls.doc .xls windows office2003
ThisDocument
ExtCollection
frmAbout
frmConfigTables
frmEditVariables
frmHelpID
frmMedTraceSettings
frmReqKey
frmReqRea
frmRiskEvaluation
frmUpdateFieldError
mbReqKeyReqRea
mbCommandBar
mbConfigTables
mbCoverPage
WordWrapper
mbCV_RiskEvaluation
mbEditVariables
ViewResetter
mbWindowsAPI
mbGlobalFunctions
mbHelpID
mbFunctions
mbImportData
mbInitDocument
mbReviewReport
mbCV_RiskClass
mbUpdateFields
mbCodeReview
mbNormal
mbReviewReport1
mbMedTraceOutput
mbProperties
mbSortTorAndTorr
mbUncName
mbGlobalDefinitions
mbHelpLinks
mbInsert
mbMenus
mbLandscape