Behavioral task
behavioral1
Sample
1b435df6c16c0b2ec27051322b2c486f4d7e3a260ef4af8f6cca3952fcbddfc8.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1b435df6c16c0b2ec27051322b2c486f4d7e3a260ef4af8f6cca3952fcbddfc8.xls
Resource
win10v2004-20220812-en
General
-
Target
1b435df6c16c0b2ec27051322b2c486f4d7e3a260ef4af8f6cca3952fcbddfc8.xlsx
-
Size
604KB
-
MD5
c87169b76d0b5cf331b68f60ccc92ce9
-
SHA1
e68c9610b27435f498adbc6ded6fa8020e26d59c
-
SHA256
1b435df6c16c0b2ec27051322b2c486f4d7e3a260ef4af8f6cca3952fcbddfc8
-
SHA512
128dbb93faef69383cc6c9ef7a62c8b383ee7b4526bd4711b44b64868e6113f42b359350fdec2638cc103524eeff8764a2e0359de4d73d27c2b299cc6bf4ec64
-
SSDEEP
6144:ItWZc/GNg/WB0jCJ4japs7Kd4jGJIP654Lel0bydczW18nKNgzC50DK1I3mtsv2k:E1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1b435df6c16c0b2ec27051322b2c486f4d7e3a260ef4af8f6cca3952fcbddfc8.xlsx.xls .xlsx windows office2003