Behavioral task
behavioral1
Sample
a69fee382cf86f9e457e0688932cbd00671d0d5218f8043f1ee385278ee19c8c.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a69fee382cf86f9e457e0688932cbd00671d0d5218f8043f1ee385278ee19c8c.xls
Resource
win10v2004-20240226-en
General
-
Target
a69fee382cf86f9e457e0688932cbd00671d0d5218f8043f1ee385278ee19c8c
-
Size
1.8MB
-
MD5
325493b99c01f442200316332b1d0b4c
-
SHA1
a7b57d47c1b80c61c61c1bcf9089eed6fdaac756
-
SHA256
a69fee382cf86f9e457e0688932cbd00671d0d5218f8043f1ee385278ee19c8c
-
SHA512
d7a9eb0ee8215be331f15f82bf88d7de940e27ab627e53b8a7e0b26f572caed0fd080ecf56544cab14e8e39fab0418b89ce1f3c4d38bf269183a69795576a494
-
SSDEEP
12288:LVuQ13jWRGxCzWpT14FSRAEAX/vz62uodt2hyViRHvFBAl1yqvbR/CeVB7gyT3:LVn13Tb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a69fee382cf86f9e457e0688932cbd00671d0d5218f8043f1ee385278ee19c8c.xls windows office2003
Sheet1
ThisWorkbook
Sheet2