Behavioral task
behavioral1
Sample
1c4078c97c0d03d8b230b531bf9c208240cddebba5342f4a5bcf15726b988089.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1c4078c97c0d03d8b230b531bf9c208240cddebba5342f4a5bcf15726b988089.xls
Resource
win10v2004-20220812-en
Errors
General
-
Target
1c4078c97c0d03d8b230b531bf9c208240cddebba5342f4a5bcf15726b988089.xlsx
-
Size
4.8MB
-
MD5
9346f374fcf7cde92df01b5b6dd698ce
-
SHA1
65e1a521f28b77fe0e6bc618652e18c063c7cb59
-
SHA256
1c4078c97c0d03d8b230b531bf9c208240cddebba5342f4a5bcf15726b988089
-
SHA512
e875992f19e5cdb0993d373732b95ec572a50e348ef67fd3c580b196ee297b4fd7b8796a1395f992a0a9451a7bca90a6acc3c93c27b22981621d9cc3db30fe73
-
SSDEEP
98304:sv4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXY:svpvFa+g8RWLdPk/84tCEr0RtNiC5eS9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
1c4078c97c0d03d8b230b531bf9c208240cddebba5342f4a5bcf15726b988089.xlsx.xls .xlsx windows office2003