Behavioral task
behavioral1
Sample
8eb7fc6fae70414a26ebac96139e3709ac30181d5fa4a8e3c5bc05100b92f453.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8eb7fc6fae70414a26ebac96139e3709ac30181d5fa4a8e3c5bc05100b92f453.xls
Resource
win10v2004-20220812-en
General
-
Target
8eb7fc6fae70414a26ebac96139e3709ac30181d5fa4a8e3c5bc05100b92f453
-
Size
452KB
-
MD5
ab917860b185db2791423ab0d0cc86ca
-
SHA1
c3e0c35fc0af669ad7b21e6516e65a004c63e6ea
-
SHA256
8eb7fc6fae70414a26ebac96139e3709ac30181d5fa4a8e3c5bc05100b92f453
-
SHA512
0b5329f44e636682596f82a0d95456dad3304606aab1d1d1b0dc003293ba42f46e2a05932396e582446c7e9482acec0b2ca9b3b3fed288cdbde191b82f056800
-
SSDEEP
6144:XV3CJQ+AmxHflB3OJLhCiExDoT2mY3mEavZUDPomi17b:XVIH3ehHo0TEiuYb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8eb7fc6fae70414a26ebac96139e3709ac30181d5fa4a8e3c5bc05100b92f453.xls windows office2003