Behavioral task
behavioral1
Sample
d897d97b1abd24ebc12b68450214a1a671d17c168d04231453c53ceff4de0f9a.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d897d97b1abd24ebc12b68450214a1a671d17c168d04231453c53ceff4de0f9a.xls
Resource
win10v2004-20240508-en
General
-
Target
d897d97b1abd24ebc12b68450214a1a671d17c168d04231453c53ceff4de0f9a
-
Size
41KB
-
MD5
03df289a59d30677e17bb44d0d683dc5
-
SHA1
efa432a7bce253130f69795379bac71f7aca9bb0
-
SHA256
d897d97b1abd24ebc12b68450214a1a671d17c168d04231453c53ceff4de0f9a
-
SHA512
d2746a9359d978052e73d5f88ff89582cc22fe1a62806faf8fe4dec9760a8eebbd8d6a8379a7a062b26dd99b357aec8aa003339a0f3f19c47a568daec305fa61
-
SSDEEP
768:18gWk3hbdlylKsgqopeJBWhZFGkE+kD4LxlnmteTnXNkQTudzYliei27:Slk3hbdlylKsgqopeJBWhZFGkE+kD4L3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d897d97b1abd24ebc12b68450214a1a671d17c168d04231453c53ceff4de0f9a.xls windows office2003