Behavioral task
behavioral1
Sample
d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d.xls
Resource
win10v2004-20220812-en
General
-
Target
d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d
-
Size
56KB
-
MD5
5f5da55da2ad44b69a12e6279c9393de
-
SHA1
fa02688bafbd2a73de8951660f8f8c66e17462bc
-
SHA256
d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d
-
SHA512
cd41a2882527aab2e69367ef15fad05088004f91226a556724a31068baa15b308c0daa110d7665fff712034f594ae0922daad79a51f648f0fc98be8345848e35
-
SSDEEP
1536:EUUUUYNsARl9gB2OwHyWMUNm0IZ95mKhlI7N7fa:khMBa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d.xls .vbs windows office2003