Behavioral task
behavioral1
Sample
743cfd49fb14e69e4824c2f7221fe015dfa8bfa2d5b331fec28470fc44c2e335.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
743cfd49fb14e69e4824c2f7221fe015dfa8bfa2d5b331fec28470fc44c2e335.xls
Resource
win10v2004-20240508-en
General
-
Target
743cfd49fb14e69e4824c2f7221fe015dfa8bfa2d5b331fec28470fc44c2e335
-
Size
73KB
-
MD5
402ac0892806c5a87d6a7e38d2a8fcba
-
SHA1
e0354b1ce4a370c7df6ad4631fcd5d5970d6aa0e
-
SHA256
743cfd49fb14e69e4824c2f7221fe015dfa8bfa2d5b331fec28470fc44c2e335
-
SHA512
77ab00d29f6b17cd14ddee785964fe576e5a75171660de9f61241b75561a668a8242d063e4d812bd64a715a6abf6c54a75698f961da8fd045017c72adda66481
-
SSDEEP
1536:J5K7k3hbdlylKsgwyzcTbWhZFGkE+jDgLx0dATcGX6d:JKk3hbdlylKsgwyzcTbWhZFGkE+jDgLE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
743cfd49fb14e69e4824c2f7221fe015dfa8bfa2d5b331fec28470fc44c2e335.xls windows office2003