Behavioral task
behavioral1
Sample
f327745d351856084755f7363d1195541c0eb702e61994998cb595b258107400.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f327745d351856084755f7363d1195541c0eb702e61994998cb595b258107400.xls
Resource
win10v2004-20240508-en
General
-
Target
f327745d351856084755f7363d1195541c0eb702e61994998cb595b258107400
-
Size
3.7MB
-
MD5
77dc3a9ffa2c7734aeda6e21f0962bc8
-
SHA1
fc4c779a429b0f812d009dd23256cbb187cf424b
-
SHA256
f327745d351856084755f7363d1195541c0eb702e61994998cb595b258107400
-
SHA512
7cd246e429f7bab8a4021e579a953ecbbc1b79fc22e03b808891657d99260c41ab409d9aac61eb903f5217e6d80ba8fbdf3e56f6383fa598bb1e6796fd308cb8
-
SSDEEP
6144:3k3hbdlylKsgqopeJBWhZFVE+W/lGARuz93e3:Gho
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f327745d351856084755f7363d1195541c0eb702e61994998cb595b258107400.xls windows office2003