Cryptam // document analysis


Sample Details

original filename: staff-roster-template.xlsm

size: 52678 bytes
submitted: 2019-11-23 15:28:04
md5: 206c1f2ca2b3b9fc31e333fcdccf2deb
sha1: 1648a4e369de594a6d3816f824ef33a0f8d76cc5
sha256: 0849306f02a3674f8a4a976bcc887728a105b8eb712c98220cfc2545e5d8f0bc
ssdeep: 768:ogpR4XFf+rX6vOooWo87B2xLVLIku1H2aXrIpStX87Igwq25egm:VpMWcOooWr7sxLJQt7IpSd8Gqtgm
content/type: Microsoft Excel 2007+
analysis time: 0.00 s
result: malware [12]
embedded file objects: yes
embedded executable: found

signature hits:

embedded.file vbaProject.bin 4456898bae8508f41ac5fe78569006c0
vbaProject.bin.35822: suspicious.office Visual Basic macro
vbaProject.bin.38150: string.shell32.dll


Yara Tags

fake_user_agent

Strings

raw strings

Dropped Files

vbaProject.bin at zip
md5: 4456898bae8508f41ac5fe78569006c0
sha1: cb5eca51981d7368fe4cb18daadfa0895637a07d
sha256: 367b5f39e42efebb9e9719afe64dfffd49f6cbccee4d676cb812aec777bcef2b
view strings