Behavioral task
behavioral1
Sample
94d68e51086fac438c3ab4a1c6996560580b035689d5a9fa6c364e8e290581d9_JC.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
94d68e51086fac438c3ab4a1c6996560580b035689d5a9fa6c364e8e290581d9_JC.xls
Resource
win10v2004-20230831-en
Errors
General
-
Target
94d68e51086fac438c3ab4a1c6996560580b035689d5a9fa6c364e8e290581d9_JC.xls
-
Size
3.2MB
-
MD5
64c8e12382ee4951e00aa9125a34fe46
-
SHA1
afb7adfbf95164eb4836bda84e624dd1a6240170
-
SHA256
94d68e51086fac438c3ab4a1c6996560580b035689d5a9fa6c364e8e290581d9
-
SHA512
e8836e0e9d653e4cb585af738c7abe3762745c5b933455d14dc8cb13221c39881e6d1dbcb3ca3bd85e4ec424e5cd35d238b2c64bba1d7dc30b9fc0f9c0f0051b
-
SSDEEP
49152:ZyFyg5MbVtAtRlEwxBf90y2+7tvXGcmYRuJC4L01onE6pGmFV/n3PIuD:ZydMwvxBF92+xv9mSuJpL9nTGE4u
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
94d68e51086fac438c3ab4a1c6996560580b035689d5a9fa6c364e8e290581d9_JC.xls.xls windows office2003