Behavioral task
behavioral1
Sample
f9a9d8e2b1d4d8fcd02e5a08ec17f20c9a046f28a8196faad21fc10f94072905.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9a9d8e2b1d4d8fcd02e5a08ec17f20c9a046f28a8196faad21fc10f94072905.xls
Resource
win10v2004-20220812-en
General
-
Target
f9a9d8e2b1d4d8fcd02e5a08ec17f20c9a046f28a8196faad21fc10f94072905
-
Size
171KB
-
MD5
c07e5a35f4db4b0b6a22ca3a99b94656
-
SHA1
3d97eac81ab41376fd3033d2db226db4a0f47c7c
-
SHA256
f9a9d8e2b1d4d8fcd02e5a08ec17f20c9a046f28a8196faad21fc10f94072905
-
SHA512
c6678d9902bd94c760190bc2dd9abb9c11ae5516f344940acd807a4269093a956a68f3fb0704cb474290e7af4047328acbe9f0b093b30f0fb3953230775b5261
-
SSDEEP
3072:jKKKKKKKKKKKKKLCaD640+ESVLe8o1LDmdMgZOPEX1arKceV/Qy+wTOUb6vhmQcy:TaD640+ESVLe8o1LDmdMgZOPEX1arKcS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f9a9d8e2b1d4d8fcd02e5a08ec17f20c9a046f28a8196faad21fc10f94072905.xls windows office2003