Behavioral task
behavioral1
Sample
b172eefc72126a2c491cd8538c63e2eb104e6bc15302117ffb521ee733745867.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b172eefc72126a2c491cd8538c63e2eb104e6bc15302117ffb521ee733745867.xls
Resource
win10v2004-20220812-en
General
-
Target
b172eefc72126a2c491cd8538c63e2eb104e6bc15302117ffb521ee733745867
-
Size
3.5MB
-
MD5
5320008958a86facd7e39c68eab6f12c
-
SHA1
ea2ea962f071b8255643edf0fe3d2a88c2d7c006
-
SHA256
b172eefc72126a2c491cd8538c63e2eb104e6bc15302117ffb521ee733745867
-
SHA512
ca2ff1fa14ed35724804d44793cd93f198d2c40aaf63cf6e3e388d272b9319a41790ad78dc688d1205d8b0ae3b58080be3e16e9e180e7cbb635c381b58da3227
-
SSDEEP
49152:C7mjvaxocCTYIE/HQF/AnQdNGCdd1WlrK/cKz9ktCh5p9y1ZQxO:C7xxx/wpXGA1WlrKEKzOtCdc1ZQx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b172eefc72126a2c491cd8538c63e2eb104e6bc15302117ffb521ee733745867.xls windows office2003