Behavioral task
behavioral1
Sample
bb0d8c307fb846ab39cafe4b13c292af107538778c6c338e7003e86cc1686128.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bb0d8c307fb846ab39cafe4b13c292af107538778c6c338e7003e86cc1686128.xls
Resource
win10v2004-20240508-en
General
-
Target
bb0d8c307fb846ab39cafe4b13c292af107538778c6c338e7003e86cc1686128
-
Size
73KB
-
MD5
3b14095d5a6b6e4a0cfd69c0f4eefac5
-
SHA1
906d63029bc34f4784b0e6caf5775e4cb24294de
-
SHA256
bb0d8c307fb846ab39cafe4b13c292af107538778c6c338e7003e86cc1686128
-
SHA512
010efa9af6464ec8d5b2f78906b2952e6ccad3d52a2be090ce6508152794c84324429a4a2cc01cb9389a3790ad2eff8d2427642435f5935a8ca9f7fee2745f7a
-
SSDEEP
1536:X527k3hbdlylKsgwyzcTbWhZFGkE+cWgLx0dANcGX6dpP:XCk3hbdlylKsgwyzcTbWhZFGkE+cWgLw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
bb0d8c307fb846ab39cafe4b13c292af107538778c6c338e7003e86cc1686128.xls windows office2003
Kangatang
ThisWorkbook