Behavioral task
behavioral1
Sample
d65ab139d225ed355243df37e21662b2d78749f75867e5cc1f824677adcae0d4_JC.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d65ab139d225ed355243df37e21662b2d78749f75867e5cc1f824677adcae0d4_JC.xls
Resource
win10v2004-20230915-en
General
-
Target
d65ab139d225ed355243df37e21662b2d78749f75867e5cc1f824677adcae0d4_JC.xls
-
Size
66KB
-
MD5
fe07adc23f14c2b978038a4c1fbbc827
-
SHA1
9e7a42a40b8faa496bc8d732546e7ffbe007aab2
-
SHA256
d65ab139d225ed355243df37e21662b2d78749f75867e5cc1f824677adcae0d4
-
SHA512
235a8b2297970e2cdfba34bfe4a0ba96b5edd207f627c61c201df52895c2de3bf8d68e8fe80fc531835439eb2ea85c29c09a618e56d553789e8dc7743687a7a7
-
SSDEEP
1536:OQk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxoyyBQHuJmJbgv5F/gTAtQa:OQk3hbdlylKsgqopeJBWhZFGkE+cL2NJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d65ab139d225ed355243df37e21662b2d78749f75867e5cc1f824677adcae0d4_JC.xls.xls windows office2003