Behavioral task
behavioral1
Sample
7d929a10116027bb4de9fd2977899617ded55fd728bdd6eb702df02ad931301a.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d929a10116027bb4de9fd2977899617ded55fd728bdd6eb702df02ad931301a.xls
Resource
win10v2004-20220812-en
General
-
Target
7d929a10116027bb4de9fd2977899617ded55fd728bdd6eb702df02ad931301a
-
Size
51KB
-
MD5
e3bab876a183fef224e015a7ff746d50
-
SHA1
7996dd6612da9745c58f25b6bd1b7830f31932cf
-
SHA256
7d929a10116027bb4de9fd2977899617ded55fd728bdd6eb702df02ad931301a
-
SHA512
3680af3fdbb7e4ecf8cd069c67baea25d2298d2df4bd2b5edf684d2a2d0cd8e7bab57f704bb326a99f44d83751d65f47a68427dd2b0b40183cbf57ba6a8aedf4
-
SSDEEP
768:DvT2j2d7x3M3HShg7Aama4AdbkTyTPLs8NhdrZThX0rD5JGvhJkO4q2wWkS4MZ:e2ncaAZkWTPLXNhdrZThX0rD5+h9NO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7d929a10116027bb4de9fd2977899617ded55fd728bdd6eb702df02ad931301a.xls windows office2003