Behavioral task
behavioral1
Sample
178e793166ef9abae8aba44bfa431e4a386a6dbffcf9b3f583fb169c507a5699.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
178e793166ef9abae8aba44bfa431e4a386a6dbffcf9b3f583fb169c507a5699.xls
Resource
win10v2004-20220812-en
General
-
Target
178e793166ef9abae8aba44bfa431e4a386a6dbffcf9b3f583fb169c507a5699
-
Size
283KB
-
MD5
aeb2a17c927a175e87a8ebf59c53e02d
-
SHA1
cb1bcde3d5de4a35176a2f3306100bc23e1feba7
-
SHA256
178e793166ef9abae8aba44bfa431e4a386a6dbffcf9b3f583fb169c507a5699
-
SHA512
4f728725abdd3706a104d269c04ae9b967f9ca0c5640cbc44c3e6152d2c688368464f4512c556535eb79eae4e62a7bd63fd737476ddd478058accf39ff0c1b68
-
SSDEEP
6144:81gxv7yZmspH7+cclKisCC9I4ukoRWGN5JIWLzk3Bh8bIMYxDi:HJvLzkxhE8x
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
178e793166ef9abae8aba44bfa431e4a386a6dbffcf9b3f583fb169c507a5699.xls windows office2003