Behavioral task
behavioral1
Sample
46d9563085f0ec2e84749d4e4a3dc1d918406451f094490494b7298cc43a2dde.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46d9563085f0ec2e84749d4e4a3dc1d918406451f094490494b7298cc43a2dde.xls
Resource
win10v2004-20220812-en
General
-
Target
46d9563085f0ec2e84749d4e4a3dc1d918406451f094490494b7298cc43a2dde
-
Size
106KB
-
MD5
1e63aede3179652c36618702c0e79b8b
-
SHA1
15bb4c957f1361f9112b33fdd7442e968fb9ea81
-
SHA256
46d9563085f0ec2e84749d4e4a3dc1d918406451f094490494b7298cc43a2dde
-
SHA512
f98ca1fab86271e101010af6d322a450db7b7232f991d8fff72a92abaa4830af8215112a555c18b12392b7fdaf57bd5ca3d7039bae0d92a3aa04f80c44cf476a
-
SSDEEP
1536:V0gQLSi+JNTbCyvvSR2Mrbz4jpLJx2uFzBeyKEb9iK:kSo2Mrbz4jpLygRK09iK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_xlm_macros
Files
-
46d9563085f0ec2e84749d4e4a3dc1d918406451f094490494b7298cc43a2dde.xls windows office2003