Behavioral task
behavioral1
Sample
9ab414acfd0ec43e519cb8247288c1e3ef72ca7a624fb4ed08e42b9f0e4dc723.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ab414acfd0ec43e519cb8247288c1e3ef72ca7a624fb4ed08e42b9f0e4dc723.xls
Resource
win10v2004-20240802-en
General
-
Target
9ab414acfd0ec43e519cb8247288c1e3ef72ca7a624fb4ed08e42b9f0e4dc723
-
Size
45KB
-
MD5
06f532d28406a7085ff13084a865223b
-
SHA1
66ca476e964c8e3c2fe0fdb0c78d1864e5b1a205
-
SHA256
9ab414acfd0ec43e519cb8247288c1e3ef72ca7a624fb4ed08e42b9f0e4dc723
-
SHA512
dcecd46c48528ded9674fd4b9ac8650a79e6d593898fa4b865bff7656542b6c0ad1e49872acd78dc0ac4f16f1ee0b82b0841c2c276a1cd5cc963d814746a2faf
-
SSDEEP
768:j23iVebDe8rmjPOtyoVjDGL61EfDlaGGx+cL/IEznBVSlsgoobwpEdgfbNIy:CyVeb68rmjPOtyoVjDGL61EfDlaGGx++
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9ab414acfd0ec43e519cb8247288c1e3ef72ca7a624fb4ed08e42b9f0e4dc723.xls windows office2003
Kangatang
ThisWorkbook