Behavioral task
behavioral1
Sample
f2b6ffd4ecce7e73d0f6781352fdf1a7dd5dd9dcfa38f8cccc42277d684c8a79_JC.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f2b6ffd4ecce7e73d0f6781352fdf1a7dd5dd9dcfa38f8cccc42277d684c8a79_JC.xls
Resource
win10v2004-20230915-en
General
-
Target
f2b6ffd4ecce7e73d0f6781352fdf1a7dd5dd9dcfa38f8cccc42277d684c8a79_JC.xls
-
Size
67KB
-
MD5
8a0eec19c5324236220f542abc338252
-
SHA1
640a6e7dd1627fbe850bd1d291c20285c044eda3
-
SHA256
f2b6ffd4ecce7e73d0f6781352fdf1a7dd5dd9dcfa38f8cccc42277d684c8a79
-
SHA512
4941b7fab56620d8b3f4f7b88ca2a17f99074d3688f4a87e30283a268f2c343bccf03b2ffb4421742e288305831b11d38ce1f33e6cdc8521429c1b0223a35d98
-
SSDEEP
1536:jQk3hbdlylKsgqopeJBWhZFGkE+cL2NdAayyBQHuJm3AgOFpkzJF3qzFIA:jQk3hbdlylKsgqopeJBWhZFGkE+cL2N2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f2b6ffd4ecce7e73d0f6781352fdf1a7dd5dd9dcfa38f8cccc42277d684c8a79_JC.xls.xls windows office2003