Behavioral task
behavioral1
Sample
a92ed1870f948dfe0b57df27389185157b0d4b28805e06989a40fde0147267b1.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a92ed1870f948dfe0b57df27389185157b0d4b28805e06989a40fde0147267b1.xls
Resource
win10v2004-20220812-en
General
-
Target
a92ed1870f948dfe0b57df27389185157b0d4b28805e06989a40fde0147267b1
-
Size
290KB
-
MD5
bddacd683e959f02ea8f590b989b2b83
-
SHA1
708aa415cf88954217e22c3bdaa4c679cb277414
-
SHA256
a92ed1870f948dfe0b57df27389185157b0d4b28805e06989a40fde0147267b1
-
SHA512
27a205c39d9e9c8280088a4cd5897328fa15e8d0d56d84436127483b22a1aa65767867dec78baf547360860835c70c6b63db506c9ff73cd082d1a99827ffc6b2
-
SSDEEP
3072:VMh53DLZk+m2GJBg7Z/3Iw60VAfDqS/zAi0WSfR4e6:Vw3DLZk+m2oKIw60VAfDtUlz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a92ed1870f948dfe0b57df27389185157b0d4b28805e06989a40fde0147267b1.xls windows office2003
ЭтаКнига
Лист1
Лист2
Лист3