Behavioral task
behavioral1
Sample
d80bbd2052e2eb7cfc95a967b1747903f9851a127e5991c7550183ad0ef64cc6.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d80bbd2052e2eb7cfc95a967b1747903f9851a127e5991c7550183ad0ef64cc6.xls
Resource
win10v2004-20240226-en
Errors
General
-
Target
d80bbd2052e2eb7cfc95a967b1747903f9851a127e5991c7550183ad0ef64cc6
-
Size
3.4MB
-
MD5
f13e8c891b0900f4bf170b9e2e2b3477
-
SHA1
229935f23ee194a815942d2c75efcf2b37b6d89a
-
SHA256
d80bbd2052e2eb7cfc95a967b1747903f9851a127e5991c7550183ad0ef64cc6
-
SHA512
565c101d727239a79974a1558c1b8dee8dc05e3c358d8c62f9ce20fd561791522bc0ac28ec1818cbf37e78a1e5ac64c5f8d4e0a48f9566358658e66895a1505e
-
SSDEEP
49152:RuRGjSpXOjJswxweNynPMF7S165KKlHbb1o45oJTTlSAf:RuRG1jpXynPeIoVs45qTh
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d80bbd2052e2eb7cfc95a967b1747903f9851a127e5991c7550183ad0ef64cc6.xls windows office2003