Behavioral task
behavioral1
Sample
70e86f684f74cde3e37a3fb824b6d730050ca5458db8b03c9e9dc975a7775674.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
70e86f684f74cde3e37a3fb824b6d730050ca5458db8b03c9e9dc975a7775674.xls
Resource
win10v2004-20240412-en
General
-
Target
70e86f684f74cde3e37a3fb824b6d730050ca5458db8b03c9e9dc975a7775674
-
Size
37KB
-
MD5
266ce67ad31b20f92176a0caae1e907e
-
SHA1
3911cd98904c90bc5c10a02faa4d6a9c60061e07
-
SHA256
70e86f684f74cde3e37a3fb824b6d730050ca5458db8b03c9e9dc975a7775674
-
SHA512
6666953cd10ea0b50f4aedce3ccde83a8f04e4ec2f5c31c9ff9f8cad6dcd8aadb8df0888694a150c5e3ada9fcd92ec80a4981d4ee54ebedd70ed72bc0ce6dd12
-
SSDEEP
768:6ySCexexjRPD07EKisifs/vlwsEuR1p1MyxTN/DacSvXi32gtmSPzZco:6LVexjRPD07EKisifs/vlwsEuR1p1My9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
70e86f684f74cde3e37a3fb824b6d730050ca5458db8b03c9e9dc975a7775674.xls .vbs windows office2003 polyglot