Behavioral task
behavioral1
Sample
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9.xls
Resource
win10v2004-20240508-en
General
-
Target
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9
-
Size
73KB
-
MD5
fb18041ce63792de83fab651e83f4ac6
-
SHA1
4637967212651a20033bd6225879e9e430c8aec2
-
SHA256
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9
-
SHA512
574663005951a836388c7af25f496a78e5f6adc3677fe4deeafd54736e18531f44ae80e739e1bfd62b95d8c4d0bffb661c9eac094704d85dfad8176b729365eb
-
SSDEEP
384:TcDV9ZTGheA+riggyZsIXCfUTC4sDvC6jsBBCMfcKSCHkMmbVogsL1nq4UuhZa+W:wD5HrigFN5I0K+4sL7h7Yaza86
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9.xls windows office2003
Kangatang
ThisWorkbook