Behavioral task
behavioral1
Sample
9df65c70cb68c6ca0d917887a6c04b8849890d0ed95457ed409cf85eb824d255.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9df65c70cb68c6ca0d917887a6c04b8849890d0ed95457ed409cf85eb824d255.xls
Resource
win10v2004-20240508-en
General
-
Target
9df65c70cb68c6ca0d917887a6c04b8849890d0ed95457ed409cf85eb824d255
-
Size
72KB
-
MD5
3057d9284b77a0ac309702bc80f05cfa
-
SHA1
d57e1f72eff1e93d8140fb97f923f7aeffaeb0b8
-
SHA256
9df65c70cb68c6ca0d917887a6c04b8849890d0ed95457ed409cf85eb824d255
-
SHA512
a577d9126d950e7fd75304aa811039caffaf3f28c696ea1b50e192b8f2863952696f078fa78b33dc47c2d471ea021ff3b3aad15c3c5f09bd56407072ceb8a39b
-
SSDEEP
1536:mtok3hOdsylKlgryzc4bNhZFGzE+kD4LgldAzvJek5o2l:tk3hOdsylKlgryzc4bNhZFGzE+kD4Lg0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9df65c70cb68c6ca0d917887a6c04b8849890d0ed95457ed409cf85eb824d255.xls windows office2003