Behavioral task
behavioral1
Sample
eecc250e3959ffaa3572218c0490ceb5c5597f11d4f6a225e13574ebdb3db71e.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eecc250e3959ffaa3572218c0490ceb5c5597f11d4f6a225e13574ebdb3db71e.xls
Resource
win10v2004-20220901-en
Errors
General
-
Target
eecc250e3959ffaa3572218c0490ceb5c5597f11d4f6a225e13574ebdb3db71e.xlsx
-
Size
4.8MB
-
MD5
90cede352673de54b372ca7bcd138ffc
-
SHA1
3ad05e2b6b5044d556aada87e3bfe93d2ea21f2c
-
SHA256
eecc250e3959ffaa3572218c0490ceb5c5597f11d4f6a225e13574ebdb3db71e
-
SHA512
30f585d3d138abfb2ee7c19079f25b19e3245a016e6d04038603f633823bccc338711c8d19bd12f8e897252acd5b8d4222f301ba711e865b79d0dc639f281ded
-
SSDEEP
98304:Ov4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXs:OvpvFa+g8RWLdPk/84tCEr0RtNiC5eS9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
eecc250e3959ffaa3572218c0490ceb5c5597f11d4f6a225e13574ebdb3db71e.xlsx.xls .xlsx windows office2003