Behavioral task
behavioral1
Sample
76dee3c80b421341848bed397dd6912dc5b6b83a0b446e85bc25bbb53ae54287.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
76dee3c80b421341848bed397dd6912dc5b6b83a0b446e85bc25bbb53ae54287.xls
Resource
win10v2004-20230220-en
General
-
Target
76dee3c80b421341848bed397dd6912dc5b6b83a0b446e85bc25bbb53ae54287.xls
-
Size
41KB
-
MD5
232374555e32b6f3d3d5d7a5555a377d
-
SHA1
db1edeb48e694873f40f5be8e48713043f4d00d5
-
SHA256
76dee3c80b421341848bed397dd6912dc5b6b83a0b446e85bc25bbb53ae54287
-
SHA512
bb7fa20c5a3f0f9b3bcc70d26037572d6a067eb1e7a3467ecb76e61f2f3b140db52b931949d2694af8bdb9f7620677390ff276bc6f729e20e53956645bce618c
-
SSDEEP
768:YPjk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJYBwXb0hJshGIu6pT+rvQ:Ujk3hbdlylKsgqopeJBWhZFGkE+cL2NJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
76dee3c80b421341848bed397dd6912dc5b6b83a0b446e85bc25bbb53ae54287.xls.xls windows office2003