Behavioral task
behavioral1
Sample
5c534903c7adfd38b59f78b4db4f3a266779cc1c8153f256f7ac557cee107b49.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5c534903c7adfd38b59f78b4db4f3a266779cc1c8153f256f7ac557cee107b49.xls
Resource
win10v2004-20221111-en
Errors
General
-
Target
5c534903c7adfd38b59f78b4db4f3a266779cc1c8153f256f7ac557cee107b49.xlsx
-
Size
4.8MB
-
MD5
832e5043f369c14706a52e76385c3d11
-
SHA1
b26db84dd528ec2a5f145951d1380506ec0f1b59
-
SHA256
5c534903c7adfd38b59f78b4db4f3a266779cc1c8153f256f7ac557cee107b49
-
SHA512
4c31111507d268cb0e10c617220786b1a221bb57350b1c48d272449aac389c53ccaf43e68f27320882c4420581bd451fe5366df3c824b51b0b1ddb4476dd5562
-
SSDEEP
98304:Ov4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXF:OvpvFa+g8RWLdPk/84tCEr0RtNiC5eSU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
5c534903c7adfd38b59f78b4db4f3a266779cc1c8153f256f7ac557cee107b49.xlsx.xls .xlsx windows office2003