Behavioral task
behavioral1
Sample
a8701fd6a5eb45e044f8bf150793f4189473dde46e0af8314652f6bf670c0a34.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a8701fd6a5eb45e044f8bf150793f4189473dde46e0af8314652f6bf670c0a34.xls
Resource
win10v2004-20240226-en
General
-
Target
a8701fd6a5eb45e044f8bf150793f4189473dde46e0af8314652f6bf670c0a34
-
Size
193KB
-
MD5
fde7103b0cc0af3186e78cf6635a9308
-
SHA1
efaf653a16673d80ad445d0a3798653cd4e2d001
-
SHA256
a8701fd6a5eb45e044f8bf150793f4189473dde46e0af8314652f6bf670c0a34
-
SHA512
88cbc8548dbc80b0ad58c08b98fa749709ff783446d277e37e6fd11ebb85306b67a9ca8c15332339729d0febf8783c7c395be383c695f4cce204210af506bfd9
-
SSDEEP
6144:Gk3hbdlylKsgwyzcTbWhZFVE+W2NnAkqjuPWwHqcByFLzmJi0Jc9BWj:VEuPWwHvQqYgcmj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a8701fd6a5eb45e044f8bf150793f4189473dde46e0af8314652f6bf670c0a34.xls windows office2003
ThisWorkbook
Sheet1
Module1