Static task
static1
Behavioral task
behavioral1
Sample
6078b55381e39779f915032533a93d725bab98982b303998fa8ba2ecfc675737.xls
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6078b55381e39779f915032533a93d725bab98982b303998fa8ba2ecfc675737.xls
Resource
win10-en-20211208
General
-
Target
6078b55381e39779f915032533a93d725bab98982b303998fa8ba2ecfc675737
-
Size
423KB
-
MD5
bce8a8ea8d47951abffeec38fbeeeef1
-
SHA1
a43467a05a6116aa78b0e15f1aa7e6f72424c1c9
-
SHA256
6078b55381e39779f915032533a93d725bab98982b303998fa8ba2ecfc675737
-
SHA512
892f7afef5c50adab8db3b629dcf4fcfe9be7ae46f86f80ce32699d542a10b9fdff572713724559539db72fc5562ada87b08e8b80f428ae6c975b53b77c06a8f
-
SSDEEP
6144:YxEtjPOtioVjDGUU1qfDlavx+W2QnASFR:RF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
6078b55381e39779f915032533a93d725bab98982b303998fa8ba2ecfc675737.xls windows office2003
ThisWorkbook
Sheet3
Sheet1
Sheet2
Module1
UserForm1