Behavioral task
behavioral1
Sample
23297b362f4fd3d9760929b497229474a9011b0dbffa8910075a91401ab67c02.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23297b362f4fd3d9760929b497229474a9011b0dbffa8910075a91401ab67c02.xls
Resource
win10v2004-20240226-en
General
-
Target
23297b362f4fd3d9760929b497229474a9011b0dbffa8910075a91401ab67c02
-
Size
894KB
-
MD5
02d5138a655b79a9064afe4bc687a3af
-
SHA1
46cd5f4c86a1a17534775d8de7312163bb1e5374
-
SHA256
23297b362f4fd3d9760929b497229474a9011b0dbffa8910075a91401ab67c02
-
SHA512
80ccafd676264714aeb41f376530202e0d112dcad4c22c7722342fa52bab6cf9188c4c270b0a6f55ecf22e516dd8ba99ac5dc24fa8f726e16447307ceff0073f
-
SSDEEP
24576:YcgmXjxTyl5fD8rvmvnv5vu58anfnlV/fNz6A3RbArFARqN:vnXjxQ9N
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
23297b362f4fd3d9760929b497229474a9011b0dbffa8910075a91401ab67c02.xls windows office2003