Behavioral task
behavioral1
Sample
e04e02e7ff9d420fcc6804c7a73701c794609a6e6ea98361fafc626604adfd14.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e04e02e7ff9d420fcc6804c7a73701c794609a6e6ea98361fafc626604adfd14.xls
Resource
win10v2004-20240226-en
General
-
Target
e04e02e7ff9d420fcc6804c7a73701c794609a6e6ea98361fafc626604adfd14
-
Size
97KB
-
MD5
50421e81f397e7a951619e7c0b4487ac
-
SHA1
496556b69e44ad1fcb10d5f67563c6fba20af665
-
SHA256
e04e02e7ff9d420fcc6804c7a73701c794609a6e6ea98361fafc626604adfd14
-
SHA512
42b2dfec88a59e48466af94f2c21ec98f64e8e9c23c35849fc705a2a55f09a3d293d18783c062939c67fd79075056038962ae02bf7929eaf407392db9a38378d
-
SSDEEP
3072:nB8rmjPOtyoVjDGL61EfDlaGGx+cL/IEe4lRLmzEpVRfQY5BUKfGAldKnii9DooV:B8rmjPOtyoVjDGL61EfDlavx+W/IEd+M
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e04e02e7ff9d420fcc6804c7a73701c794609a6e6ea98361fafc626604adfd14.xls windows office2003
Module1
ThisWorkbook
Sheet1