Behavioral task
behavioral1
Sample
1403ff432466eeb043f36dac1f12902ecddc506a2379c24756b5e930094751f1.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1403ff432466eeb043f36dac1f12902ecddc506a2379c24756b5e930094751f1.xls
Resource
win10v2004-20220812-en
General
-
Target
1403ff432466eeb043f36dac1f12902ecddc506a2379c24756b5e930094751f1
-
Size
39KB
-
MD5
000d91cadbc4290d8d6c00b42f624450
-
SHA1
8c2f5294c66040261400ba2d7c73b311024f377a
-
SHA256
1403ff432466eeb043f36dac1f12902ecddc506a2379c24756b5e930094751f1
-
SHA512
1d7776cde24cd7fde3042d525f359880307813c24c8d9ad3eca6cfbb05cbb4e34ded77d43c0cd5b8e83c00bd2e26917b8c98389cc7bf6c2784024f6143caefd8
-
SSDEEP
768:xdTr6FaSkLu6pAJqNueejMGl6Nc7yRzs1H75wkZUiEfClsPI4ukoRWGNVU3R/7n4:LTr6FaSkLu6pAJqNuiGl6Nc7yRzs1H7j
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1403ff432466eeb043f36dac1f12902ecddc506a2379c24756b5e930094751f1.xls .vbs windows office2003