Behavioral task
behavioral1
Sample
1734f66a644457c302d05ba57e9e3d73cfd1fd92339fd6869eaaa1783f241b8e.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1734f66a644457c302d05ba57e9e3d73cfd1fd92339fd6869eaaa1783f241b8e.xls
Resource
win10v2004-20240508-en
General
-
Target
1734f66a644457c302d05ba57e9e3d73cfd1fd92339fd6869eaaa1783f241b8e
-
Size
83KB
-
MD5
3c841985c61445f7041e0fa46a0f6cc0
-
SHA1
e4c1fb2320df81d3ccf069dbdff1817c1dbbda8b
-
SHA256
1734f66a644457c302d05ba57e9e3d73cfd1fd92339fd6869eaaa1783f241b8e
-
SHA512
6b0412cbe10151963cb8b70e6339f95dd7c49752e8fc6b85ca773c0cbe93f44bd24ea663530aedfd5cc551ab1a6704233d7b97fed978f5474f965a5c95154e6f
-
SSDEEP
1536:nopk3hOdsylKlgryzc4bNhZFGzE+jDgLg0dAw9c4n:ck3hOdsylKlgryzc4bNhZFGzE+jDgLg0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
1734f66a644457c302d05ba57e9e3d73cfd1fd92339fd6869eaaa1783f241b8e.xls windows office2003