Behavioral task
behavioral1
Sample
886aaecb9e0da6dc0a8e1b5b7ef6ffebd73289befac0da86d17fe4cf3ca17a4c.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
886aaecb9e0da6dc0a8e1b5b7ef6ffebd73289befac0da86d17fe4cf3ca17a4c.xls
Resource
win10v2004-20221111-en
General
-
Target
886aaecb9e0da6dc0a8e1b5b7ef6ffebd73289befac0da86d17fe4cf3ca17a4c.xlsx
-
Size
171KB
-
MD5
5e575d8fdc92f66bfb75afe60fc5f6de
-
SHA1
be6df91f4d94cc7c9b34867590fc03ecc0f44dd2
-
SHA256
886aaecb9e0da6dc0a8e1b5b7ef6ffebd73289befac0da86d17fe4cf3ca17a4c
-
SHA512
73f7e854ec808c8ff17d8da6893eaa4016f471dbe09559b6ca9427f9d953ddaef492f2fbdf80d2a8b67bca36fd7ae9d39173b51da5dd793138f8b7c45609bd16
-
SSDEEP
3072:MKKKKKKKKKKKKKLCaD640+ESVLe8o1LDmdMgZOPEX1arKceV/Qy+wTOUb6vhmQcy:gaD640+ESVLe8o1LDmdMgZOPEX1arKcS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
886aaecb9e0da6dc0a8e1b5b7ef6ffebd73289befac0da86d17fe4cf3ca17a4c.xlsx.xls .xlsx windows office2003