Behavioral task
behavioral1
Sample
9a44a91e71d440fef97310e64af7ca6e46c9b13ad8fafae0d5bc3af114d1cb49.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9a44a91e71d440fef97310e64af7ca6e46c9b13ad8fafae0d5bc3af114d1cb49.xls
Resource
win10v2004-20220812-en
General
-
Target
9a44a91e71d440fef97310e64af7ca6e46c9b13ad8fafae0d5bc3af114d1cb49
-
Size
1.7MB
-
MD5
f4cdc2e286419d3deff79f1f9d295d15
-
SHA1
5dbad8455a46c7f71cd3485b931aacb5f0da09f1
-
SHA256
9a44a91e71d440fef97310e64af7ca6e46c9b13ad8fafae0d5bc3af114d1cb49
-
SHA512
4cc67d126d45664f75585045cfd08aa7312a2762dd14e8fa390613a8673b4a0d46d6df0a0679903cc8375b76bff3b226e258c4bbeb4dec230a241d184b0855bc
-
SSDEEP
24576:PNykYavbZ8igbN3GGZEb2ViOpHbyCjyYKBE7Tk2WDs:PnFvGZ3VViOpHbyCjyYKBE7Tk2r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9a44a91e71d440fef97310e64af7ca6e46c9b13ad8fafae0d5bc3af114d1cb49.xls windows office2003