Behavioral task
behavioral1
Sample
224ad6f7da759b56a497a2e11c7055106d06ffdac2e6055f9a89e0ba64a12d1c.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
224ad6f7da759b56a497a2e11c7055106d06ffdac2e6055f9a89e0ba64a12d1c.xls
Resource
win10v2004-20240226-en
General
-
Target
224ad6f7da759b56a497a2e11c7055106d06ffdac2e6055f9a89e0ba64a12d1c
-
Size
304KB
-
MD5
ae62967061fff454ece865eca6c02fc3
-
SHA1
efda0dfabdc2a7a4c89cad8f6ca175ebb4544b58
-
SHA256
224ad6f7da759b56a497a2e11c7055106d06ffdac2e6055f9a89e0ba64a12d1c
-
SHA512
19572e4a6c1164212d15dc2316464d49b6a062172e6ef1aeebc47dc8f2b2a0d22979065908099956ff34a0b1eb34bfc95606783111af83d99797d8b83d265193
-
SSDEEP
6144:bVdqHlzKgCVQAPqWQtTKB98molObIUuiooHQ:b/qHlmqWQtTu98dObILiooQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
224ad6f7da759b56a497a2e11c7055106d06ffdac2e6055f9a89e0ba64a12d1c.xls windows office2003