Behavioral task
behavioral1
Sample
ab1d9ebf377a2eea9e8604431b9887ec0d8239912eef22a099441e21f68c7506.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab1d9ebf377a2eea9e8604431b9887ec0d8239912eef22a099441e21f68c7506.xls
Resource
win10v2004-20220812-en
General
-
Target
ab1d9ebf377a2eea9e8604431b9887ec0d8239912eef22a099441e21f68c7506
-
Size
4.2MB
-
MD5
35eced8497f4f901e3bbfda33af7af70
-
SHA1
43407dc613d2510661e2bf8c1041932461ccc9a7
-
SHA256
ab1d9ebf377a2eea9e8604431b9887ec0d8239912eef22a099441e21f68c7506
-
SHA512
727aa14f0be753f42e8dbcdc1c9906886753969b474470e94e3675c46669dd4408108de42e2b0985333a5a007bbde0eedfc00ebccb308759304f82dc92494adb
-
SSDEEP
98304:M+qOw4MIOP/G33K04N10+MFiOseGUg4a:wOw4MBG321+WeBU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ab1d9ebf377a2eea9e8604431b9887ec0d8239912eef22a099441e21f68c7506.xls windows office2003