Behavioral task
behavioral1
Sample
8fc5e2d5db759637bf269466af8f0fee211d3ad13917d82c83e7c6fa446f110e.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8fc5e2d5db759637bf269466af8f0fee211d3ad13917d82c83e7c6fa446f110e.xls
Resource
win10v2004-20240426-en
General
-
Target
8fc5e2d5db759637bf269466af8f0fee211d3ad13917d82c83e7c6fa446f110e
-
Size
43KB
-
MD5
40dc2b5c6beebde8ba72ef662001011b
-
SHA1
ebf46ac5d2761ba8aee03d1c023f6b0cf45557ec
-
SHA256
8fc5e2d5db759637bf269466af8f0fee211d3ad13917d82c83e7c6fa446f110e
-
SHA512
1e7d0608a4d4afd7fccefb68f0fc064eeffb97ee66db19b31c575a998ffaff0e3594e38aef8e6881b0ea0c2c52b806f0cc497609802eac4ed4f28df59ccb8dc8
-
SSDEEP
768:iaJWk3hbdlylKsgqopeJBWhZFGkE+kD4Lxlnm4KABxDvLq6DXliXUU7v:rkk3hbdlylKsgqopeJBWhZFGkE+kD4Lc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8fc5e2d5db759637bf269466af8f0fee211d3ad13917d82c83e7c6fa446f110e.xls windows office2003