Behavioral task
behavioral1
Sample
2ada03c879cfaa1f842137b6a773a8fe6ed9931528da268a3767f1fa82414111.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ada03c879cfaa1f842137b6a773a8fe6ed9931528da268a3767f1fa82414111.xls
Resource
win10v2004-20221111-en
Errors
General
-
Target
2ada03c879cfaa1f842137b6a773a8fe6ed9931528da268a3767f1fa82414111.xlsx
-
Size
4.8MB
-
MD5
0147f6aa16d546ec6f1964feac7dbcce
-
SHA1
706c60857ba59426d81c1aac6f136992074ed285
-
SHA256
2ada03c879cfaa1f842137b6a773a8fe6ed9931528da268a3767f1fa82414111
-
SHA512
7e0424993f8ef574acf979aa5d2504800292ce824aa33cb255da28d4118654a2d56ab63b5101a9ae22453b9028c306ebf17598b6ebae3dff303ea09211aa7a5a
-
SSDEEP
98304:9v4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXX5:9vpvFa+g8RWLdPk/84tCEr0RtNiC5eSU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
2ada03c879cfaa1f842137b6a773a8fe6ed9931528da268a3767f1fa82414111.xlsx.xls .xlsx windows office2003