Behavioral task
behavioral1
Sample
9856326bc8b77fdbb8585dfc8560e8c2d731fcacc60acd2ef2c85decb0442d57.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9856326bc8b77fdbb8585dfc8560e8c2d731fcacc60acd2ef2c85decb0442d57.xls
Resource
win10v2004-20240508-en
General
-
Target
9856326bc8b77fdbb8585dfc8560e8c2d731fcacc60acd2ef2c85decb0442d57
-
Size
43KB
-
MD5
cbff613f2b7fc3086ec9686080312ce5
-
SHA1
9229bbcc96f020ac7e322c14da85473d85c83453
-
SHA256
9856326bc8b77fdbb8585dfc8560e8c2d731fcacc60acd2ef2c85decb0442d57
-
SHA512
3f8e44e6acb790f8205c73090bb1a2f08df80fe7cac305ae67dc0b6b3182f327fb2e299d07a049b1ab77251d2c6bb3ac5949ec3566b87228cad1fcee9dfb73d6
-
SSDEEP
768:9aJWk3hbdlylKsgqopeJBWhZFGkE+kD4Lxlnm4KABxDvLq6DXliXUU7v:Mkk3hbdlylKsgqopeJBWhZFGkE+kD4Lc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9856326bc8b77fdbb8585dfc8560e8c2d731fcacc60acd2ef2c85decb0442d57.xls windows office2003