Behavioral task
behavioral1
Sample
7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199.xls
Resource
win10v2004-20220812-en
General
-
Target
7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199
-
Size
25KB
-
MD5
f1c80a738722554b91452c59adb2f27d
-
SHA1
a768bd41c189e9304d17c7dbf697a1d04971d441
-
SHA256
7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199
-
SHA512
e31c0e292abe32777190475267897a6ffac2c1613971a33c3fe28a66e6c33f03b41bfaf9092a1db2d45618d2c7edd8339c10ef92fe784e4c993bd8533d0f2600
-
SSDEEP
192:1Ha439gyLPUV+/T/D/Ns0+PKY1l6Lpb9KX+lTf5eKIHiZyFwDRa:A+Lb60+eh9iefY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199.xls windows office2003
ЭтаКнига
Лист1
Лист2
Лист3