Behavioral task
behavioral1
Sample
baf407615b933d53fd611681561040227287b20123bccc9606f809a5164c2472.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
baf407615b933d53fd611681561040227287b20123bccc9606f809a5164c2472.xls
Resource
win10v2004-20220812-en
General
-
Target
baf407615b933d53fd611681561040227287b20123bccc9606f809a5164c2472
-
Size
46KB
-
MD5
34fa02bb258c93cdf17cb49f25bc0866
-
SHA1
e82793b96cb3d90687374e912479f1463c530993
-
SHA256
baf407615b933d53fd611681561040227287b20123bccc9606f809a5164c2472
-
SHA512
cd61d67cb08e179d8833b3a27cbfd833710fea445bab31b0f18db53388e2ea13e5f93ffa3382a84656161a6194b387c9c32c10bcd80500be5e25230960cd1410
-
SSDEEP
768:o+LbAeseZZAV31i2nhuVID3jdTC3Ma44L:NoV38OuGPdTCMeL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
baf407615b933d53fd611681561040227287b20123bccc9606f809a5164c2472.xls windows office2003
ЭтаКнига
Лист1
Лист2
Лист3