Behavioral task
behavioral1
Sample
d1200844dec8c5427f808b9cb857c8afd8f3fb3e.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d1200844dec8c5427f808b9cb857c8afd8f3fb3e.xls
Resource
win10v2004-20230220-en
General
-
Target
d1200844dec8c5427f808b9cb857c8afd8f3fb3e
-
Size
129KB
-
MD5
c08c5cb8689ab19d5237fa4f4487a54c
-
SHA1
d1200844dec8c5427f808b9cb857c8afd8f3fb3e
-
SHA256
f7adc4d4be5b528ba8e1704ec7c0824bdd2a0b97733e38f400403643fc507598
-
SHA512
07651a356772676e4e5c5f526d0e9165f5301a8e62a7827974c87ef10e15e4f410fdb4fc1a33120cc7e636c772f112aca7aaed159eb428fd59c3d052a0bdac58
-
SSDEEP
3072:Sk3hOdsylKlgxopeiBNhZFGzE+cL2kdAJZqw2KkjnMKSiJFs7Ijv6:Sk3hOdsylKlgxopeiBNhZF+E+W2kdAG4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d1200844dec8c5427f808b9cb857c8afd8f3fb3e.xls .js windows office2003
ThisWorkbook
Sheet1