Behavioral task
behavioral1
Sample
97100470a9a303e69b93a1278ef2f4a5d83c1888d4d2883453e2a849d2265b44.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97100470a9a303e69b93a1278ef2f4a5d83c1888d4d2883453e2a849d2265b44.xls
Resource
win10v2004-20220812-en
General
-
Target
97100470a9a303e69b93a1278ef2f4a5d83c1888d4d2883453e2a849d2265b44
-
Size
40KB
-
MD5
a17a662200cc96490c9f2e8f76ae2b80
-
SHA1
ad1957c975b52f7ece82878664ed8422e1d9beb9
-
SHA256
97100470a9a303e69b93a1278ef2f4a5d83c1888d4d2883453e2a849d2265b44
-
SHA512
b00c410e33f8f4c2cb49ca3e31a58207525aada64f9a827957a60ed68f28b3cb3f5c0ddd46e69ec958f85cd58b88a10669bf6325d2fb554cb67f9c203ecb5796
-
SSDEEP
768:9FFFFL4YmOf/NvLsMFfnux4niR27yZ957r+o/uwPMsHWpktoKM4F:9FFFFL4YmOf/NvLsMFfnux4n/yZ951FH
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
97100470a9a303e69b93a1278ef2f4a5d83c1888d4d2883453e2a849d2265b44.xls .vbs windows office2003