Behavioral task
behavioral1
Sample
c72e54284f0bcf114298a982e7540aefffe3d3e23ad01f4867c7187faa71ec2d.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c72e54284f0bcf114298a982e7540aefffe3d3e23ad01f4867c7187faa71ec2d.xls
Resource
win10v2004-20221111-en
General
-
Target
c72e54284f0bcf114298a982e7540aefffe3d3e23ad01f4867c7187faa71ec2d
-
Size
51KB
-
MD5
acffb5e785e6b9095adba3a1cc9cad69
-
SHA1
07ec4a0c31af60528e7b04df8f2a373e09a96e29
-
SHA256
c72e54284f0bcf114298a982e7540aefffe3d3e23ad01f4867c7187faa71ec2d
-
SHA512
d21cf2e31524c3fe012ea90accad41e1433132f15238c31fb23ef9264bd41fc7a25a8251ab53c0cb8faf2327e5e9fd1445c06026dc4892cbb29aa209a2732a2a
-
SSDEEP
1536:LxxxEc3xMtL8FgjNkIrxTwV09S+tpUZTj2fD7uoajka:arE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
c72e54284f0bcf114298a982e7540aefffe3d3e23ad01f4867c7187faa71ec2d.xls windows office2003