Behavioral task
behavioral1
Sample
ff55470722fc964480435b8f40a58b94ae91271d45a3c4898542238ecd360aee.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff55470722fc964480435b8f40a58b94ae91271d45a3c4898542238ecd360aee.xls
Resource
win10v2004-20220812-en
General
-
Target
ff55470722fc964480435b8f40a58b94ae91271d45a3c4898542238ecd360aee
-
Size
54KB
-
MD5
8344bf174594fba367868ca5f4fe616f
-
SHA1
c43402e52135f303047eb2a361367006c4a8facf
-
SHA256
ff55470722fc964480435b8f40a58b94ae91271d45a3c4898542238ecd360aee
-
SHA512
4683b82ba3afa013d90259bbef2da5dfcca9c8f11f801d97abda67d3b8269ecb810f4de1dcfef5075222ef37f1e0826cd9be20071d9960182e9d2a8dc0eb4eaf
-
SSDEEP
1536:ClxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAB5djVX4niGz:ClxEtjPOtioVjDGUU1qfDlaGGx+cL2Qf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ff55470722fc964480435b8f40a58b94ae91271d45a3c4898542238ecd360aee.xls windows office2003
Module1
ThisWorkbook
Sheet1
Sheet2
Sheet3