Behavioral task
behavioral1
Sample
743f0cf486a9042fe61c3509d89292901a9d7cfa884156394213d13b45e27cc9.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
743f0cf486a9042fe61c3509d89292901a9d7cfa884156394213d13b45e27cc9.xls
Resource
win10v2004-20240426-en
Errors
General
-
Target
743f0cf486a9042fe61c3509d89292901a9d7cfa884156394213d13b45e27cc9.xls
-
Size
1.1MB
-
MD5
9c371d8b2af8066ba95955583515d920
-
SHA1
300df703ab849d36c936b190ebbd0b93825a5837
-
SHA256
743f0cf486a9042fe61c3509d89292901a9d7cfa884156394213d13b45e27cc9
-
SHA512
b188d329979ece7e70c1d0eb57b299078821bbda0b96b69f27b79f518f24be45745af7e981ef3bff0ab85c6cbb011bae3bbcd8e00ac309d99ed07fcd195a777a
-
SSDEEP
12288:VSGo1hMSI4VlZYkNXvV7WavURzOEtZ0BFymQbEDpK54qBLOjvls4:UthMSDDxNfV7WB1OEfABqdOjvls4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
743f0cf486a9042fe61c3509d89292901a9d7cfa884156394213d13b45e27cc9.xls.xls windows office2003