Behavioral task
behavioral1
Sample
cc5fa711fc0b5e1ccf9a03c8ee2091381df14a5ca6e0a29aa48224ec6eddbbd6.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cc5fa711fc0b5e1ccf9a03c8ee2091381df14a5ca6e0a29aa48224ec6eddbbd6.xls
Resource
win10v2004-20240508-en
General
-
Target
cc5fa711fc0b5e1ccf9a03c8ee2091381df14a5ca6e0a29aa48224ec6eddbbd6
-
Size
38KB
-
MD5
e41e74abf4a62a7ec3d270a66580126e
-
SHA1
75048f8b350ad18e0874ddcc52dd43475b22b72d
-
SHA256
cc5fa711fc0b5e1ccf9a03c8ee2091381df14a5ca6e0a29aa48224ec6eddbbd6
-
SHA512
54b38effd90f90aea5e1afd48c73715e6dbaff89943fd5b2885af228efe830fd8e084ede69c174eb56567d996de76c95a8016b99fbf603ba6fb43549e0ad3703
-
SSDEEP
768:DvT2EkMsXq/NdUrA6jRP6MQhKLP5mvrFWju2CkwNoxQj6Eo+xz5Td9+SodZi4Ad:VeXq/NdUrA6jRP6MQhKLP5mvrFWju2CJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
cc5fa711fc0b5e1ccf9a03c8ee2091381df14a5ca6e0a29aa48224ec6eddbbd6.xls windows office2003