Behavioral task
behavioral1
Sample
22b23b6ed9c8701a32dd245bf9bb926d1150f4725b4408231a627c213e48eaed.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22b23b6ed9c8701a32dd245bf9bb926d1150f4725b4408231a627c213e48eaed.xls
Resource
win10v2004-20240226-en
General
-
Target
22b23b6ed9c8701a32dd245bf9bb926d1150f4725b4408231a627c213e48eaed
-
Size
283KB
-
MD5
46e51621bd2129f016137f673c3eae7a
-
SHA1
2306fc48377881f5ef994b490d44d9df370d9bdb
-
SHA256
22b23b6ed9c8701a32dd245bf9bb926d1150f4725b4408231a627c213e48eaed
-
SHA512
f6d0a5b239db7a036b94d7140b60168a326b3644e333d1f122c913a233f53283ab9dabc2472e4191490317026c8636c2e66b0d810404029e119fd43b4211fafb
-
SSDEEP
3072:Emuk34L22uE+wTZ01QOdPQqUNeKZBLjGRgWX4Ej6FD9OpAStM37n8MXNtJPe0y8/:luo4n01QbBLzBtI8ZT2OM0SR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
22b23b6ed9c8701a32dd245bf9bb926d1150f4725b4408231a627c213e48eaed.xls windows office2003