Behavioral task
behavioral1
Sample
160b85f2402a2f8666ab8494239494ffdc018334c2623020ea6695d7dc5ba137.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
160b85f2402a2f8666ab8494239494ffdc018334c2623020ea6695d7dc5ba137.xls
Resource
win10v2004-20240426-en
General
-
Target
160b85f2402a2f8666ab8494239494ffdc018334c2623020ea6695d7dc5ba137
-
Size
202KB
-
MD5
f922bb3c1f7135fafbe753c6c143899f
-
SHA1
5cc27a8352ad703c54adb64548445af53f427983
-
SHA256
160b85f2402a2f8666ab8494239494ffdc018334c2623020ea6695d7dc5ba137
-
SHA512
49e9870d0c39881d76c1c9e0a241fe0bd7671b1d45e00e1d00f3de2d34f1801f1a220e6843fc36e7564acb9ff48f3f1dfe263142a926b8ba71a82e4832abdb7b
-
SSDEEP
6144:QxEtjPOtioVjDGUU1qfDlavx+W+LIfdA9m:
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
160b85f2402a2f8666ab8494239494ffdc018334c2623020ea6695d7dc5ba137.xls windows office2003