Behavioral task
behavioral1
Sample
10156668be598d9ce55279031221b901c0c5084cfb7d1c915f0094bbd4b5d9ec.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
10156668be598d9ce55279031221b901c0c5084cfb7d1c915f0094bbd4b5d9ec.xls
Resource
win10v2004-20230221-en
General
-
Target
10156668be598d9ce55279031221b901c0c5084cfb7d1c915f0094bbd4b5d9ec.xls
-
Size
183KB
-
MD5
b792c7ad94e2dd02df3cbe1b678eb875
-
SHA1
7bf6d421f153c72f5a93ea808d98c2b6bf01a6f9
-
SHA256
10156668be598d9ce55279031221b901c0c5084cfb7d1c915f0094bbd4b5d9ec
-
SHA512
50a6ead3bc2b5ae43c9529df363272a3fac4576206ce63930b260f8dd9c075eada6ace1ebc552994f455ed6555fffc0059183ede6cb9ddc40f950f4c290d3a8b
-
SSDEEP
3072:UfVfutgdLXa5BXoCSdSGReXPbW8ZDbVJ3aE/bpxEtjPOtioVjDGUU1qfDlaGGx+j:UfNLdLv4MeDW0HqENxEtjPOtioVjDGUl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
10156668be598d9ce55279031221b901c0c5084cfb7d1c915f0094bbd4b5d9ec.xls.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
Sheet4
Sheet5
Sheet6
Sheet7