Behavioral task
behavioral1
Sample
5098cee3f54bd5d6cf3147699f7e78ce3fc95cc5f5f3093e61b45f13a8617e22.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5098cee3f54bd5d6cf3147699f7e78ce3fc95cc5f5f3093e61b45f13a8617e22.xls
Resource
win10v2004-20220812-en
General
-
Target
5098cee3f54bd5d6cf3147699f7e78ce3fc95cc5f5f3093e61b45f13a8617e22
-
Size
169KB
-
MD5
ff4d218840e05b340a2a6073383af9ce
-
SHA1
0a4026bd1d0e37ca7ef896caa36ba0a25c193ef7
-
SHA256
5098cee3f54bd5d6cf3147699f7e78ce3fc95cc5f5f3093e61b45f13a8617e22
-
SHA512
affbbaed22539813ba6b7cf649a2a256b56e607c0158b3b8b1f55ba9c8ffe1836d70580d61e25f1d802efe6b6abc637f6101d11541d90ee4603d907669e01f3b
-
SSDEEP
3072:CvTxER/vep2wFvHGMIB6tZjA5bTzrjd/axfmqdzfjrhD27giX63voMCwuL+7D8wz:CLxER/vep2wFvHGMIB6tZjA5bTzrjd/i
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
5098cee3f54bd5d6cf3147699f7e78ce3fc95cc5f5f3093e61b45f13a8617e22.xls windows office2003