Behavioral task
behavioral1
Sample
6065df097322dafccc1f7de59c6935717abb30f88f6d250a88bc207d8e648099.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6065df097322dafccc1f7de59c6935717abb30f88f6d250a88bc207d8e648099.xls
Resource
win10v2004-20221111-en
Errors
General
-
Target
6065df097322dafccc1f7de59c6935717abb30f88f6d250a88bc207d8e648099.xlsx
-
Size
4.8MB
-
MD5
526d96a96d3f9fc94d571c50a7c3e542
-
SHA1
e66081e94f1a8e5f99964bb86099d4df4285bd97
-
SHA256
6065df097322dafccc1f7de59c6935717abb30f88f6d250a88bc207d8e648099
-
SHA512
818a4cf4c38614df290576a3ab2da441d62607178cf3ea89a309f3e98728ca9a22b3d79c8205cb84a67f3e61b48ba7b9d514b608f5488dc65bff4e1a8ad14361
-
SSDEEP
98304:Ov4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXM:OvpvFa+g8RWLdPk/84tCEr0RtNiC5eSt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
6065df097322dafccc1f7de59c6935717abb30f88f6d250a88bc207d8e648099.xlsx.xls .xlsx windows office2003