Behavioral task
behavioral1
Sample
fc33dc100461e09d12ad209a534c65c4b4d2879112a5cdc100a22e0b2fe26131.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
fc33dc100461e09d12ad209a534c65c4b4d2879112a5cdc100a22e0b2fe26131.xls
Resource
win10v2004-20240508-en
General
-
Target
fc33dc100461e09d12ad209a534c65c4b4d2879112a5cdc100a22e0b2fe26131
-
Size
1.6MB
-
MD5
c67fbfd945e7db2bc51eccdeb1c84063
-
SHA1
200378bd7dc6bf0ebf5cc0c42404fb2c9904aaa1
-
SHA256
fc33dc100461e09d12ad209a534c65c4b4d2879112a5cdc100a22e0b2fe26131
-
SHA512
82bfd63af4553a71ef1b00a8fed5cfd499c4de597ce9b6aefb2bafbd7de2a36faca4ddcd97808de928d13842e8e2fa1109a5db7a44611e7197108631f74add7d
-
SSDEEP
24576:aA3eN5m8A3eN5mgZVrlSLAZMnN1ixSuwVeCaPu+PQfW5jj0g9a:aGezGeYZnNsxSuwViP6EB9a
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fc33dc100461e09d12ad209a534c65c4b4d2879112a5cdc100a22e0b2fe26131.xls windows office2003