Behavioral task
behavioral1
Sample
9b86709d66870369ac607ea9cf907ee0f157266fa4eb7e12575bd8a445c470f0.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9b86709d66870369ac607ea9cf907ee0f157266fa4eb7e12575bd8a445c470f0.xls
Resource
win10v2004-20240426-en
General
-
Target
9b86709d66870369ac607ea9cf907ee0f157266fa4eb7e12575bd8a445c470f0
-
Size
41KB
-
MD5
b41520f317d8aa186f760b739558065b
-
SHA1
812b1af0f4b1bdffd2c313f39e31e71d08e7180d
-
SHA256
9b86709d66870369ac607ea9cf907ee0f157266fa4eb7e12575bd8a445c470f0
-
SHA512
b8b14ee5a00aae3d99382e6b6cb56e38f592bc4f46ce69925912876d352ad7c707f8daa6e73f48bab173409c7e0c769b6ca44ae867bbbfc9602d858db9c783e8
-
SSDEEP
768:/8gWk3hbdlylKsgqopeJBWhZFGkE+kD4LxlnmteTnXNkQTudzYliei27:klk3hbdlylKsgqopeJBWhZFGkE+kD4L3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9b86709d66870369ac607ea9cf907ee0f157266fa4eb7e12575bd8a445c470f0.xls windows office2003