Behavioral task
behavioral1
Sample
969345890993fdbe3ef963e5a4cbdcd59308045e7d282ec4abfc7b8f6ad0e393.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
969345890993fdbe3ef963e5a4cbdcd59308045e7d282ec4abfc7b8f6ad0e393.xls
Resource
win10v2004-20240426-en
General
-
Target
969345890993fdbe3ef963e5a4cbdcd59308045e7d282ec4abfc7b8f6ad0e393
-
Size
44KB
-
MD5
67296eff5132c8c2a92ca8da31b71673
-
SHA1
502dd4f37e93eccd5c1172fc61251e9c2440008e
-
SHA256
969345890993fdbe3ef963e5a4cbdcd59308045e7d282ec4abfc7b8f6ad0e393
-
SHA512
9f26ada5940853d26e9c4aa02ff367227f00ec6f92bf9a7153e9ec44a3b07b322a1415224b505ac2908a83d3503a38b7899ec333c343152547ade9a7a8239e6f
-
SSDEEP
768:8hNNOwysyAh/9PXx3f5vVXpwCIuw67co9xEtjPOtioVjDGUU1qfDlaGGx+jDYIxH:KOwysyAh/9PXx3f5vVXpwCIuw67co9xN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
969345890993fdbe3ef963e5a4cbdcd59308045e7d282ec4abfc7b8f6ad0e393.xls windows office2003