Behavioral task
behavioral1
Sample
632d7333ed525f76fa59366334d69b06f924f52bb2552d5301072bc68775ba12.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
632d7333ed525f76fa59366334d69b06f924f52bb2552d5301072bc68775ba12.xls
Resource
win10v2004-20240426-en
General
-
Target
632d7333ed525f76fa59366334d69b06f924f52bb2552d5301072bc68775ba12
-
Size
41KB
-
MD5
9853206ebf52b2e19637f9a2b5552910
-
SHA1
9aaa17b803b182d74f3d0f57e0c526127b59703b
-
SHA256
632d7333ed525f76fa59366334d69b06f924f52bb2552d5301072bc68775ba12
-
SHA512
b6269a292edd9b0f00789829e1fc692c31d9ccf8e486d8f5ca9cbd76253b799e3bd18bcb2450d81b1f21a75f331f035b8f9a6729aa4603f0f6d1cb9dd4726709
-
SSDEEP
768:B8gWk3hbdlylKsgqopeJBWhZFGkE+kD4LxlnmteTnXNkQTudzYliei27:Glk3hbdlylKsgqopeJBWhZFGkE+kD4L3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
632d7333ed525f76fa59366334d69b06f924f52bb2552d5301072bc68775ba12.xls windows office2003