Behavioral task
behavioral1
Sample
4c77b13394fc19efe2fdad9692b326cd2aa4184d84d71f25529bfac6066d7deb5d233b04.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4c77b13394fc19efe2fdad9692b326cd2aa4184d84d71f25529bfac6066d7deb5d233b04.xls
Resource
win10v2004-20230220-en
General
-
Target
4c77b13394fc19efe2fdad9692b326cd2aa4184d84d71f25529bfac6066d7deb5d233b04.xls
-
Size
37KB
-
MD5
4c77b13394fc19efe2fdad9692b326cd
-
SHA1
2aa4184d84d71f25529bfac6066d7deb5d233b04
-
SHA256
25ba8547ff917cbed1e663269369ac80025246e3e8b1c21996e629cdb76b43af
-
SHA512
96cf062fa3bd2fff43555c64497d0314c0566a7aaddc20bed67d67d0b09f5baaaf0bdada1969683267559236e088c11210161496016f80f8e30075530a86cd19
-
SSDEEP
768:toevT2RE3yrAoz9CZ4mJWRMT67EI7pp0N8s3C+qAKAg+YJ9TaYV+eLo21Hd:eioz9CZ4mJWRMT67EI7pp0N8s3C+qAKR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4c77b13394fc19efe2fdad9692b326cd2aa4184d84d71f25529bfac6066d7deb5d233b04.xls.xls windows office2003