Behavioral task
behavioral1
Sample
8be51b3f3be3eb45d2cff9715a2d40fc04c11f25734ea8e7a3f551bcd2c216c8.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8be51b3f3be3eb45d2cff9715a2d40fc04c11f25734ea8e7a3f551bcd2c216c8.xls
Resource
win10v2004-20221111-en
General
-
Target
8be51b3f3be3eb45d2cff9715a2d40fc04c11f25734ea8e7a3f551bcd2c216c8
-
Size
205KB
-
MD5
442e22b587e1daa9947e5479c14ac3f0
-
SHA1
6cb08c6eef2c7c7ccf5b8cc972add1c5833b3847
-
SHA256
8be51b3f3be3eb45d2cff9715a2d40fc04c11f25734ea8e7a3f551bcd2c216c8
-
SHA512
b1030b27a1989f930b58b581cc575e439c9aff8e703de6709c437132eeec0aed710daf6777108a6f3611a74351a3f01987deb225c1c9dd807abb225240c7da35
-
SSDEEP
6144:lZ+RwPONXoRjDhIcp0fDlavx+W26nAX84fCcu40COAW5+Ist3gdtx0MQZ:gRuFAW4IOUt/Q
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8be51b3f3be3eb45d2cff9715a2d40fc04c11f25734ea8e7a3f551bcd2c216c8.xls windows office2003
ThisWorkbook
Sheet1