Behavioral task
behavioral1
Sample
c194cfc79c6f494b8ebf4d82095fa0c21efc49ad94a9c7bd1901b14bec02b917.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c194cfc79c6f494b8ebf4d82095fa0c21efc49ad94a9c7bd1901b14bec02b917.xls
Resource
win10v2004-20240611-en
General
-
Target
c194cfc79c6f494b8ebf4d82095fa0c21efc49ad94a9c7bd1901b14bec02b917
-
Size
77KB
-
MD5
d5ff0da318bb9dea4512208d2898ef1e
-
SHA1
812ca8be024e5e05acd8d54c1cf541df69bff039
-
SHA256
c194cfc79c6f494b8ebf4d82095fa0c21efc49ad94a9c7bd1901b14bec02b917
-
SHA512
6248017e0e9e4f3128463248585f655d6041476b2cc8d0cdf4e1b53cf46b23faef3d1edcdc1afe08145db216d3b06a2ffae27bd1ba8df35a4bb65a9ddcc62504
-
SSDEEP
1536:Bqk3hOdsylKlgryzc4bNhZFGzE+jDgLg0dAO:Yk3hOdsylKlgryzc4bNhZFGzE+jDgLgU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
c194cfc79c6f494b8ebf4d82095fa0c21efc49ad94a9c7bd1901b14bec02b917.xls windows office2003