Behavioral task
behavioral1
Sample
7f046adc930c4337616808e607999b4069e41ee8a41e8da019f934ba58d1ec66.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f046adc930c4337616808e607999b4069e41ee8a41e8da019f934ba58d1ec66.xls
Resource
win10v2004-20221111-en
Errors
General
-
Target
7f046adc930c4337616808e607999b4069e41ee8a41e8da019f934ba58d1ec66.xlsx
-
Size
4.8MB
-
MD5
ba636c94d47964d10299ff270e4e11a2
-
SHA1
490591df8411d7e890779d05be00448521fa6cd0
-
SHA256
7f046adc930c4337616808e607999b4069e41ee8a41e8da019f934ba58d1ec66
-
SHA512
5088fc444e75df7cda0f8839a59c793d7ab9c76f930b2ed90992cf797f87c3d2150176fbbd520b487436799bd1c1c310f632a35486d131e8fa92186cce4d3c45
-
SSDEEP
98304:8v4K91f7vFpQ+g8RFpiLd+8kLD84tCEr0RtNiC5eSsNMt+r+WC1HnKHnn3BBXXXd:8vpvFa+g8RWLdPk/84tCEr0RtNiC5eS4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7f046adc930c4337616808e607999b4069e41ee8a41e8da019f934ba58d1ec66.xlsx.xls .xlsx windows office2003