Behavioral task
behavioral1
Sample
e1cf3a310699d6b131e022bc2f1704fa283919e248b932ebe684e01c29d49c17.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e1cf3a310699d6b131e022bc2f1704fa283919e248b932ebe684e01c29d49c17.xls
Resource
win10v2004-20220812-en
General
-
Target
e1cf3a310699d6b131e022bc2f1704fa283919e248b932ebe684e01c29d49c17
-
Size
54KB
-
MD5
45def5853808d6da504e56e9129adb4e
-
SHA1
4ab33259cd03c496a7c3da2c1b92d69873909a74
-
SHA256
e1cf3a310699d6b131e022bc2f1704fa283919e248b932ebe684e01c29d49c17
-
SHA512
6bd4b9efc97abdeb8e33bf39df6259a6ca1cf50ce09137c447257be2742bd38ca60b392c6088a638e356cfadde26de180f590b1633f32d8058f9b06ce77aa538
-
SSDEEP
1536:8e9nQPi8noLKLOf04DhVFhvqAb7WQYD408zuX9914J60GTt7li:8e9nQPi8noLKLOf04DhVFhvqAb7WQYDg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e1cf3a310699d6b131e022bc2f1704fa283919e248b932ebe684e01c29d49c17.xls windows office2003