Behavioral task
behavioral1
Sample
165b4a4e15993c85e4ada54201e788d622f3fbd19f267b78616effb9c703a1cc.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
165b4a4e15993c85e4ada54201e788d622f3fbd19f267b78616effb9c703a1cc.xls
Resource
win10v2004-20240611-en
General
-
Target
165b4a4e15993c85e4ada54201e788d622f3fbd19f267b78616effb9c703a1cc
-
Size
83KB
-
MD5
6a6df2e6dbbacf2f6ee0c18a78a1de6e
-
SHA1
51b062783d77caf11e96ec58be640b883c421b68
-
SHA256
165b4a4e15993c85e4ada54201e788d622f3fbd19f267b78616effb9c703a1cc
-
SHA512
088e7cd554e4e17025bf3539fa75a5cd06f2999537d157efef8c38e238ad937247fcb95ddf4e285169bad6c81dd56f3fdd98bcf139ae458a6bba21b99f0b1b17
-
SSDEEP
1536:eopk3hOdsylKlgryzc4bNhZFGzE+jDgLg0dAw9c4n:Dk3hOdsylKlgryzc4bNhZFGzE+jDgLg0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
165b4a4e15993c85e4ada54201e788d622f3fbd19f267b78616effb9c703a1cc.xls windows office2003