Behavioral task
behavioral1
Sample
e635533dc0093bf5811ec17aaa24c9f60a793dfa5350678c5af7811dd8a94449.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e635533dc0093bf5811ec17aaa24c9f60a793dfa5350678c5af7811dd8a94449.xls
Resource
win10v2004-20220812-en
General
-
Target
e635533dc0093bf5811ec17aaa24c9f60a793dfa5350678c5af7811dd8a94449
-
Size
53KB
-
MD5
dcc0486d34a092ca4030c810c4603786
-
SHA1
9268e1d42cf080222ee1fbfdaa9d77b969cf2e63
-
SHA256
e635533dc0093bf5811ec17aaa24c9f60a793dfa5350678c5af7811dd8a94449
-
SHA512
3333114781ca63db17b99965cf76b7cbdc09c3d0617d7266cccb22e997d81f7ff8b637dfa9b4bcc6b1a68fd522dc3e8a857725ab45d91e3f79878c516f51ebb6
-
SSDEEP
1536:JeeeeqbjmZK9kEztBcM9JbKvWA7GDLpiPI8sQWN/Rd5N8o+hWR/Xa9DI82M:UkEztBcM9JbKvWA7GDLksQWN/Rd5N8oc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e635533dc0093bf5811ec17aaa24c9f60a793dfa5350678c5af7811dd8a94449.xls windows office2003