Behavioral task
behavioral1
Sample
8466da2e0fd6ee6b2ed351722039959742cb6fe93bcb7a02fe00ddda3a48ed5e.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8466da2e0fd6ee6b2ed351722039959742cb6fe93bcb7a02fe00ddda3a48ed5e.xls
Resource
win10v2004-20240709-en
General
-
Target
8466da2e0fd6ee6b2ed351722039959742cb6fe93bcb7a02fe00ddda3a48ed5e
-
Size
886KB
-
MD5
2decdb983963097ab3643a72b1696113
-
SHA1
63730cf05a547d29f9170983aa75189781a59962
-
SHA256
8466da2e0fd6ee6b2ed351722039959742cb6fe93bcb7a02fe00ddda3a48ed5e
-
SHA512
39804cc93839af3225ec744a41345a6b36104059e92e371a3b4206416a6e37e9756c474ea5e53914cd117b4020ab762feb8f07f0334d6961391f3583cb79324f
-
SSDEEP
12288:+7LThF/78PmV+qiNV+kbrg+lS6yWlPwbUmafyw:+3PiT+kbVSiobUqw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8466da2e0fd6ee6b2ed351722039959742cb6fe93bcb7a02fe00ddda3a48ed5e.xls windows office2003
Kangatang
Sheet1
Sheet2