Behavioral task
behavioral1
Sample
ace9e3b52fda7efbc41954768e9da43ee94e68800951efafc01cd5082f49d636.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ace9e3b52fda7efbc41954768e9da43ee94e68800951efafc01cd5082f49d636.xls
Resource
win10v2004-20220812-en
Errors
General
-
Target
ace9e3b52fda7efbc41954768e9da43ee94e68800951efafc01cd5082f49d636.xlsx
-
Size
4.8MB
-
MD5
bb79dbb6a87cb4cd32b0103521888bad
-
SHA1
8e17cab441ecd129a82acafb55c5371b9ab8984d
-
SHA256
ace9e3b52fda7efbc41954768e9da43ee94e68800951efafc01cd5082f49d636
-
SHA512
ba755077a38e86ee3e9044d88de5501746ed5a67959a158cd70b9e303c2bc18a1c06d9294e420a465cd9a02fe8bb3cc760ed91a1002cd1ad3f4daf61aebbb075
-
SSDEEP
98304:Qv4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXS:QvpvFa+g8RWLdPk/84tCEr0RtNiC5eSX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
ace9e3b52fda7efbc41954768e9da43ee94e68800951efafc01cd5082f49d636.xlsx.xls .xlsx windows office2003