Behavioral task
behavioral1
Sample
8f758ab4c7195dddfd4f617ea0d066bb8198a2be9ef3c854417e38656f6c5aa0_JC.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8f758ab4c7195dddfd4f617ea0d066bb8198a2be9ef3c854417e38656f6c5aa0_JC.xls
Resource
win10v2004-20230915-en
General
-
Target
8f758ab4c7195dddfd4f617ea0d066bb8198a2be9ef3c854417e38656f6c5aa0_JC.xls
-
Size
277KB
-
MD5
44f48ed8cd94685f7b97cceefb5652e7
-
SHA1
5d6839514b4f11982716dbf53990a6547d713e12
-
SHA256
8f758ab4c7195dddfd4f617ea0d066bb8198a2be9ef3c854417e38656f6c5aa0
-
SHA512
5f2037262c356b231e6be896bda807ba849f8da0583ace157c8d35b1cf840487a003f7a6c17781ebbfc00d4b3c06f9a5889e7e789bcaf24b927bf87f7260f2a0
-
SSDEEP
6144:aVtNfN4gdxEtjPOtioVjDGUU1qfDlavx+W2QnwGRzG/5ewvjnt70yQ2:aVOa/vjntA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8f758ab4c7195dddfd4f617ea0d066bb8198a2be9ef3c854417e38656f6c5aa0_JC.xls.xls windows office2003