Behavioral task
behavioral1
Sample
054d32f119d8fa26a040842ebf7e523a4f7203037cb42238490bbdbaf69dbb4d_JC.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
054d32f119d8fa26a040842ebf7e523a4f7203037cb42238490bbdbaf69dbb4d_JC.xls
Resource
win10v2004-20230915-en
General
-
Target
054d32f119d8fa26a040842ebf7e523a4f7203037cb42238490bbdbaf69dbb4d_JC.xlsx
-
Size
38KB
-
MD5
a0939fe019485426ee55b070d62b7352
-
SHA1
91f72bafb5ef1e7992f8b99aef2b67467fdafb53
-
SHA256
054d32f119d8fa26a040842ebf7e523a4f7203037cb42238490bbdbaf69dbb4d
-
SHA512
b9e2393b22b73f6b724e4d7ad7dd09f6ef8c657add87cde7e463e531af033a4bfd1e3bc1f5467eca8f12767a12dc30652aabb3f8f5edba4e902798e09030b197
-
SSDEEP
768:WvT2CQ6T5Lxk3hOdsylKlgryzc4bNhZFGzE+ch4LgldAlQ5rd142DuG8yC:iPxk3hOdsylKlgryzc4bNhZFGzE+ch4R
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
054d32f119d8fa26a040842ebf7e523a4f7203037cb42238490bbdbaf69dbb4d_JC.xlsx.xls .xlsx windows office2003