Static task
static1
Behavioral task
behavioral1
Sample
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls
Resource
win10v2004-20220414-en
General
-
Target
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c
-
Size
937KB
-
MD5
0fea640a7da27f365b3675f73626b9c9
-
SHA1
fd4825f244e9c145486cb6930ad05695b9972668
-
SHA256
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c
-
SHA512
c9a10288762f3f5a3fdff17f8dd8560e7a884f1b83f405c2e85c6c86e42f69a30841c13aa0f2ecfc55aed42995d7aeb8fe40415e423ed0a306d2e7d00883dfbf
-
SSDEEP
24576:h3zS0aqbCrxgFhFSQVB5DjDLG6/8otVBTN9s:K9Fo5VLDLGwTBT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls windows office2003
Sem
Page1
Module1
UserForm1
Module2
Class1
UserForm6
Page11
Module6
Module5
Module4