Behavioral task
behavioral1
Sample
769a160f0f86b2fd8bfc466ff5a50cb24261a93b993e0c44f4c259a7a1656657.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
769a160f0f86b2fd8bfc466ff5a50cb24261a93b993e0c44f4c259a7a1656657.xls
Resource
win10v2004-20240426-en
General
-
Target
769a160f0f86b2fd8bfc466ff5a50cb24261a93b993e0c44f4c259a7a1656657
-
Size
940KB
-
MD5
a887bb8ccbec24585a7ad5c68c5628d2
-
SHA1
0acc29f2d344187cf3638e5cea562767537420b1
-
SHA256
769a160f0f86b2fd8bfc466ff5a50cb24261a93b993e0c44f4c259a7a1656657
-
SHA512
d252c95f81a0be07b9a108d85db016cc59a0f829b437f8f703d9c41af377d54c85b09500fc5cc1c3d112056ffbb6a3e7b37849be271d92d9483f4773365506f7
-
SSDEEP
12288:UOrr3/eSvrsf7akZvKLjwdPL1pvLUOGGDl1om3b6D0SVFbUMhvc0wcu:UOrr3/eSvgf7akZvJ1OO1AgkE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
769a160f0f86b2fd8bfc466ff5a50cb24261a93b993e0c44f4c259a7a1656657.xls windows office2003
Kangatang
ThisWorkbook