Behavioral task
behavioral1
Sample
ce36c1272ff79a40bb6c4bc978d656e0358019b1545ee4a330e6e9d5d4099712.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce36c1272ff79a40bb6c4bc978d656e0358019b1545ee4a330e6e9d5d4099712.xls
Resource
win10v2004-20240226-en
Errors
General
-
Target
ce36c1272ff79a40bb6c4bc978d656e0358019b1545ee4a330e6e9d5d4099712
-
Size
2.2MB
-
MD5
4b5002571b720c05c57a4d7f313aa9c4
-
SHA1
e06cb8fe991e42f004a73acce52e085ee7f46699
-
SHA256
ce36c1272ff79a40bb6c4bc978d656e0358019b1545ee4a330e6e9d5d4099712
-
SHA512
4acc1cea19f1f7356d2ac76241d43fc3b85f1510e7fd7ac0e61654755c197e2debfe6747e78c7f8b09906730e36cbd0cecfcf368ad6729bd2ab3bc6c1db8ff96
-
SSDEEP
49152:mEs8yTYFMxRLE3eTLZqXS74S7TpGPcYpwRr:mEsxxRLE3eT4XS74S7TpW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ce36c1272ff79a40bb6c4bc978d656e0358019b1545ee4a330e6e9d5d4099712.xls windows office2003