Behavioral task
behavioral1
Sample
9c10d04ded68e5dda0eab8550bd018c8c9be0fa5b9182dda89762255b600be59.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c10d04ded68e5dda0eab8550bd018c8c9be0fa5b9182dda89762255b600be59.xls
Resource
win10v2004-20220812-en
Errors
General
-
Target
9c10d04ded68e5dda0eab8550bd018c8c9be0fa5b9182dda89762255b600be59
-
Size
136KB
-
MD5
2358ce7e53417f8c5b6edac96d9dfc88
-
SHA1
6741ec7e4df6c2b9d64c5e7ac7c1e7ef8ccfafd7
-
SHA256
9c10d04ded68e5dda0eab8550bd018c8c9be0fa5b9182dda89762255b600be59
-
SHA512
da9d90c97034cef2ae9373854b79807d68678a2c36f06743f33724f5fb054cb2e9f159a2502f11a032e9258c6e374afcb39e9295f8a5ea28506caa637b398877
-
SSDEEP
3072:j5JaRH/C0OeNHZVDUihCA5xE9mX0OIkCADgB29qbkI:j5JaRH6gN5RzX5xE9mXfz9qA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
9c10d04ded68e5dda0eab8550bd018c8c9be0fa5b9182dda89762255b600be59.xls windows office2003