Behavioral task
behavioral1
Sample
5b725ace9174a1f54bbde017ef2e14e1bce6684f7888853ec666c5d4d6cf5066.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b725ace9174a1f54bbde017ef2e14e1bce6684f7888853ec666c5d4d6cf5066.xls
Resource
win10v2004-20220812-en
Errors
General
-
Target
5b725ace9174a1f54bbde017ef2e14e1bce6684f7888853ec666c5d4d6cf5066.xlsx
-
Size
4.8MB
-
MD5
4b06e484791178071d2f5c1c9c07765b
-
SHA1
1aea2c36f281d473c3c3e4139403df08ac92282e
-
SHA256
5b725ace9174a1f54bbde017ef2e14e1bce6684f7888853ec666c5d4d6cf5066
-
SHA512
a0056efc2bf1ee93c706fd66fb19c92e47160124478f7220af42accace55e48bf9bf5fcdc816da939e0b5b69995aeba4f533fa25d2cf6a0452486379b72b40d6
-
SSDEEP
98304:3v4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXC:3vpvFa+g8RWLdPk/84tCEr0RtNiC5eS7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
5b725ace9174a1f54bbde017ef2e14e1bce6684f7888853ec666c5d4d6cf5066.xlsx.xls .xlsx windows office2003