Behavioral task
behavioral1
Sample
67904bb8b019589106ec201cdf557cd97f27050508bf4e02ab14bd6aa5ad896f.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67904bb8b019589106ec201cdf557cd97f27050508bf4e02ab14bd6aa5ad896f.xls
Resource
win10v2004-20220812-en
General
-
Target
67904bb8b019589106ec201cdf557cd97f27050508bf4e02ab14bd6aa5ad896f
-
Size
63KB
-
MD5
855102df7e40afa2a7c7226b74aa9438
-
SHA1
b1917167ccb21af14058c4347f2fc39e0c2fd9a8
-
SHA256
67904bb8b019589106ec201cdf557cd97f27050508bf4e02ab14bd6aa5ad896f
-
SHA512
93b35474443236bbe76a13911293f1644b5c2850273118e6779b821512b95fd01f15d41e4ed4b1a24f7a9817fb2717a775679e66a9a49d4d39c473369290308e
-
SSDEEP
1536:0GxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAy/hzhjj/Xp:0GxEtjPOtioVjDGUU1qfDlaGGx+cL2Ql
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
67904bb8b019589106ec201cdf557cd97f27050508bf4e02ab14bd6aa5ad896f.xls windows office2003