Behavioral task
behavioral1
Sample
3acc83882deb910ee88e57c7f02509c2c1784449d988a8eb0af33d41fc278dbf.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3acc83882deb910ee88e57c7f02509c2c1784449d988a8eb0af33d41fc278dbf.xls
Resource
win10v2004-20221111-en
General
-
Target
3acc83882deb910ee88e57c7f02509c2c1784449d988a8eb0af33d41fc278dbf.xlsx
-
Size
999KB
-
MD5
5caa0ad3ab5e9103512f1947a0d1b142
-
SHA1
2e9ab6246e6c5586d42d682e7417851c028cc5cd
-
SHA256
3acc83882deb910ee88e57c7f02509c2c1784449d988a8eb0af33d41fc278dbf
-
SHA512
eeb2c10a59c585d139f4b76d363ea37673f03fb63203348b90fb1d86ad58d96ef42adcee737698e3b7e52587be48e8eea731d98810fd7925458a7f2a36ce7694
-
SSDEEP
12288:fCLRDAZIwpCvnLGUAyovCpTcQ0/I6YoCzEO5l:6FzcmnLGUAyoCWh/r1Czz5l
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3acc83882deb910ee88e57c7f02509c2c1784449d988a8eb0af33d41fc278dbf.xlsx.xls .xlsx windows office2003