Behavioral task
behavioral1
Sample
fab023324d3b92c130668bcf65f59a3a1f358029ca40944c4c0b87b7319e3d14.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fab023324d3b92c130668bcf65f59a3a1f358029ca40944c4c0b87b7319e3d14.xls
Resource
win10v2004-20220812-en
General
-
Target
fab023324d3b92c130668bcf65f59a3a1f358029ca40944c4c0b87b7319e3d14
-
Size
40KB
-
MD5
c1ec954f2beef0397399cf65811ee0a3
-
SHA1
a9d828ebda9260f711c15ab7069a56c6e6cbb09c
-
SHA256
fab023324d3b92c130668bcf65f59a3a1f358029ca40944c4c0b87b7319e3d14
-
SHA512
95165d8d5b50b2433a7c5b65d099f80cf87098ff6ec4b040ff8f456164ac882e07a6147910c7f74d6d928b878504b4370e29b5b2c68166ab4acbffbcfcb94946
-
SSDEEP
768:nvT2LtIXq/NdUrA6jRtguK7QLP5mvrF0ju2CRfhSFX+ElawbUFsp4yoziRC:miXq/NdUrA6jRtguK7QLP5mvrF0ju2CP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fab023324d3b92c130668bcf65f59a3a1f358029ca40944c4c0b87b7319e3d14.xls windows office2003