Behavioral task
behavioral1
Sample
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d_JC.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d_JC.xls
Resource
win10v2004-20230915-en
General
-
Target
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d_JC.xls
-
Size
66KB
-
MD5
6d28bfe2447e21a17a61dcbf695a7da0
-
SHA1
7120d286ecdd775bb25f387affd26248aff7d5bf
-
SHA256
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d
-
SHA512
7123e1d95093975aabb654d0a4d3187104ff086a8c27953a7536f787495cb302f2977f2b0149949368732cc84f6edccd179226751d3967fe54be15c010b3808e
-
SSDEEP
1536:kQk3hbdlylKsgqopeJBWhZFGkE+cL2NdAFyyBQHuJmzt2UgeqyAphfoAApfamZiL:kQk3hbdlylKsgqopeJBWhZFGkE+cL2NI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
96e6ea363e1df3de9f59bed0b732f38293b343d3192e3c69d69475232ff0225d_JC.xls.xls windows office2003