Behavioral task
behavioral1
Sample
79230f1257ec5d3476e32a1793b3bbde1f39bf38242db3ee2c6c46b13ebf74af.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
79230f1257ec5d3476e32a1793b3bbde1f39bf38242db3ee2c6c46b13ebf74af.xls
Resource
win10v2004-20220812-en
General
-
Target
79230f1257ec5d3476e32a1793b3bbde1f39bf38242db3ee2c6c46b13ebf74af
-
Size
76KB
-
MD5
67f9d6603753d93f904505bef9f4f972
-
SHA1
24903c08c77d07680ae4f5575ec9deb666a437f3
-
SHA256
79230f1257ec5d3476e32a1793b3bbde1f39bf38242db3ee2c6c46b13ebf74af
-
SHA512
ecea33f59c7c58a819c3d365829c9e7eb85a5a8ce96c7299d28e2192a43bd9007fedb300308186d1f4f16370216978f2bc390228a654f7c8787e101ad3d8cade
-
SSDEEP
1536:wBBB+Py2jcc0lbxOBCgZl2UcJtXwmaln:a2jcc0lbxOsRXJtXwmal
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
79230f1257ec5d3476e32a1793b3bbde1f39bf38242db3ee2c6c46b13ebf74af.xls .vbs windows office2003