Behavioral task
behavioral1
Sample
88e60713c27d76c36c2e093a9ffd8f9cc96e62f52abf96a3bf966f50bec6ec9f.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88e60713c27d76c36c2e093a9ffd8f9cc96e62f52abf96a3bf966f50bec6ec9f.xls
Resource
win10v2004-20240426-en
General
-
Target
88e60713c27d76c36c2e093a9ffd8f9cc96e62f52abf96a3bf966f50bec6ec9f
-
Size
39KB
-
MD5
c72616347ef5a094181aa057f2ca0601
-
SHA1
be1aaf6dbb8bd1bca0cbdecee7784fe6c319006b
-
SHA256
88e60713c27d76c36c2e093a9ffd8f9cc96e62f52abf96a3bf966f50bec6ec9f
-
SHA512
3f8a65bb037f8c1855c575979d72fa274eccc034187b592a539b5a42f04653046b5c26bb48778c11002799c602a7001a49511e42837973e5c7d6620d89b94ead
-
SSDEEP
768:3B8vT2gXcIH1hkWxZKxyZxggmAd+56OZpiD68s3CjqAKllb3zfB5qi4uLP2FqqId:3BOXcIH1bxZKxywgmAd+tZpiD68s3CjI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
88e60713c27d76c36c2e093a9ffd8f9cc96e62f52abf96a3bf966f50bec6ec9f.xls windows office2003