Behavioral task
behavioral1
Sample
451af2f46a6eeb15cd9044c5c1a65af5751996e84f57fa5e119c54b967f3ac63.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
451af2f46a6eeb15cd9044c5c1a65af5751996e84f57fa5e119c54b967f3ac63.xls
Resource
win10v2004-20240508-en
General
-
Target
451af2f46a6eeb15cd9044c5c1a65af5751996e84f57fa5e119c54b967f3ac63
-
Size
77KB
-
MD5
d5290e62fad91110f551ff4c4ba3db75
-
SHA1
a407466c376e8030a16782e977d42190581a8a19
-
SHA256
451af2f46a6eeb15cd9044c5c1a65af5751996e84f57fa5e119c54b967f3ac63
-
SHA512
42f4df979999b4c67565f6ff313640a5f6eb245f80cd34fe1d4a1197644fe039159ec34c78bf3d58f7d2dc1fca29aff86d2c97e0cee1f231030e8d5b3066bb12
-
SSDEEP
1536:gqk3hOdsylKlgryzc4bNhZFGzE+jDgLg0dAO:7k3hOdsylKlgryzc4bNhZFGzE+jDgLgU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
451af2f46a6eeb15cd9044c5c1a65af5751996e84f57fa5e119c54b967f3ac63.xls windows office2003