Behavioral task
behavioral1
Sample
c8a69fb857f62d76e8c015b28a763249e362e8d29bdc040f3e036bc2dae91f6c.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
c8a69fb857f62d76e8c015b28a763249e362e8d29bdc040f3e036bc2dae91f6c.xls
Resource
win10v2004-20240508-en
General
-
Target
c8a69fb857f62d76e8c015b28a763249e362e8d29bdc040f3e036bc2dae91f6c
-
Size
77KB
-
MD5
d5a7f817bed1a4f3d6367f3417506e09
-
SHA1
857160d1e915045735c61123169ff072c56416ab
-
SHA256
c8a69fb857f62d76e8c015b28a763249e362e8d29bdc040f3e036bc2dae91f6c
-
SHA512
d76960918888f1a8d5e7845770bc1d0172dbe9105641db1f3325cdd5132ae84a40ab03a6c43bb3bbda122752dedde6c8a17158a916c6e97bb068aad352c6f431
-
SSDEEP
1536:vqk3hOdsylKlgryzc4bNhZFGzE+jDgLg0dAO:ik3hOdsylKlgryzc4bNhZFGzE+jDgLgU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
c8a69fb857f62d76e8c015b28a763249e362e8d29bdc040f3e036bc2dae91f6c.xls windows office2003