Behavioral task
behavioral1
Sample
aa9f2e7397ec26f00f34efd2fc47a59ade13ed334f72ee3ec146c5fc1f8a3045.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa9f2e7397ec26f00f34efd2fc47a59ade13ed334f72ee3ec146c5fc1f8a3045.xls
Resource
win10v2004-20220812-en
General
-
Target
aa9f2e7397ec26f00f34efd2fc47a59ade13ed334f72ee3ec146c5fc1f8a3045
-
Size
578KB
-
MD5
9fef9c2e0bf5e9dc4a6d88a23f02f31a
-
SHA1
1f3191407971e1ad12bd75c0f4d5a47477b77552
-
SHA256
aa9f2e7397ec26f00f34efd2fc47a59ade13ed334f72ee3ec146c5fc1f8a3045
-
SHA512
cdb20000c7ed5868dfd7504101952a0c675c6849e0ad10edbfbc93ca4a445a8372f3d538be177d4bb3d7ab043a18ed291f49f1f5742ba58904b9b9fb2e235a5e
-
SSDEEP
6144:EBbrJ/bsQAnUGfaLLA2MOD8oGwred9Da/BRkDQtNlVN0zYNE1j8Kf4cRcA5MZySm:QknUGSMFBD2/BRztNfN/N4Cfr4CE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
aa9f2e7397ec26f00f34efd2fc47a59ade13ed334f72ee3ec146c5fc1f8a3045.xls windows office2003