Behavioral task
behavioral1
Sample
3e3a93ee5a5ae447a3c3182a910e3ea7ab79fe9d5b1d9aebf16cfae66a3714de.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3e3a93ee5a5ae447a3c3182a910e3ea7ab79fe9d5b1d9aebf16cfae66a3714de.xls
Resource
win10v2004-20240426-en
General
-
Target
3e3a93ee5a5ae447a3c3182a910e3ea7ab79fe9d5b1d9aebf16cfae66a3714de
-
Size
134KB
-
MD5
6265b4a538b143fcb32f5b89207bc19b
-
SHA1
4bcf95758f1ce66a1eed6bf3205659d850f3e3fd
-
SHA256
3e3a93ee5a5ae447a3c3182a910e3ea7ab79fe9d5b1d9aebf16cfae66a3714de
-
SHA512
03cc14d9fff01f9a711e03bda053d3655aaadaa02f67ffce0eecb81a70b9a3801fe2f1698f0de19d8de7e43ff5e4c94ac9ce39c758fe09219d535aaa0f5e4b2b
-
SSDEEP
3072:xRQ+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmZRfi:xRQ+A64l7VX1TnRrpXJ0eQm02RxHFk3X
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3e3a93ee5a5ae447a3c3182a910e3ea7ab79fe9d5b1d9aebf16cfae66a3714de.xls windows office2003
ThisWorkbook
Sheet1
Module1