Behavioral task
behavioral1
Sample
a9b54ccac2d90a7dc844a130c9dad3e18e141235067b51d17da1e59a4a15bf26.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9b54ccac2d90a7dc844a130c9dad3e18e141235067b51d17da1e59a4a15bf26.xls
Resource
win10v2004-20220812-en
General
-
Target
a9b54ccac2d90a7dc844a130c9dad3e18e141235067b51d17da1e59a4a15bf26
-
Size
3.3MB
-
MD5
e69034279d888363b5460e7fce004910
-
SHA1
5775c608ea82656e4409d3bbb339ff8768782346
-
SHA256
a9b54ccac2d90a7dc844a130c9dad3e18e141235067b51d17da1e59a4a15bf26
-
SHA512
19ec5323e5ea2e3d4e625e2c2fc3cf36bc3b05e1cfe6ba7749cc215ca6c5d28627b2c2daed3659f263f0617fe9d0bc2ef2a8848080ed78e5750663f47c2b8ed9
-
SSDEEP
49152:9jO73apco2ToIEnBIl9I/QF9mjJ5lGl7yH86Zisyih5Jlyg97r:9jppdneb/mflGl7yc6Z9yi9Mg97r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a9b54ccac2d90a7dc844a130c9dad3e18e141235067b51d17da1e59a4a15bf26.xls windows office2003