Behavioral task
behavioral1
Sample
49e0fb55f5ca1bb7a4893e7d5d903d4ea42a62e95d3c50b9c22307276563bf30.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
49e0fb55f5ca1bb7a4893e7d5d903d4ea42a62e95d3c50b9c22307276563bf30.xls
Resource
win10v2004-20240508-en
General
-
Target
49e0fb55f5ca1bb7a4893e7d5d903d4ea42a62e95d3c50b9c22307276563bf30
-
Size
33KB
-
MD5
36a13f08c588a78f5639c5526a06cb71
-
SHA1
5a397b818e94e7117cb28478ecf00d7e37492ea8
-
SHA256
49e0fb55f5ca1bb7a4893e7d5d903d4ea42a62e95d3c50b9c22307276563bf30
-
SHA512
38f26ad93d3afe83f392e6fe5ea9643df203519a6b0edf59c803b15a2bc84f0e00ba9d57f279fc8fd9105d54e51f7839911ef10dfd9d8987278371f7ae7ba9fa
-
SSDEEP
768:+ik3hOdsylKlgryzc4bNhZFGzE+cL2knAJk2nuh+nlaT2:/k3hOdsylKlgryzc4bNhZFGzE+cL2kn+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
49e0fb55f5ca1bb7a4893e7d5d903d4ea42a62e95d3c50b9c22307276563bf30.xls windows office2003
ThisWorkbook
Sheet1