Behavioral task
behavioral1
Sample
e43c881e2096c8ec7eb70ea8c207ed59f493ec3b6ac69c0d8184220e6844e103.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e43c881e2096c8ec7eb70ea8c207ed59f493ec3b6ac69c0d8184220e6844e103.xls
Resource
win10v2004-20220901-en
Errors
General
-
Target
e43c881e2096c8ec7eb70ea8c207ed59f493ec3b6ac69c0d8184220e6844e103.xlsx
-
Size
4.8MB
-
MD5
4a30b5e91f24631571725a882769cb67
-
SHA1
f72c37c67cae05509bac579997ff9ce806cc6676
-
SHA256
e43c881e2096c8ec7eb70ea8c207ed59f493ec3b6ac69c0d8184220e6844e103
-
SHA512
f95f7543a68ac6bc4d451c6886f7c232d1798427697f9197c6eaf45b412620d2c21f3156fc444b49f325b9ae0a4752398298ea57c91db0c4a67dfb70e6a31276
-
SSDEEP
98304:Ov4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXy:OvpvFa+g8RWLdPk/84tCEr0RtNiC5eSL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
e43c881e2096c8ec7eb70ea8c207ed59f493ec3b6ac69c0d8184220e6844e103.xlsx.xls .xlsx windows office2003