Behavioral task
behavioral1
Sample
14f3aafe8b8d72786ddad65a08f41183ce60d525c1e2e570c1d98630bd367c49.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14f3aafe8b8d72786ddad65a08f41183ce60d525c1e2e570c1d98630bd367c49.xls
Resource
win10v2004-20240611-en
General
-
Target
14f3aafe8b8d72786ddad65a08f41183ce60d525c1e2e570c1d98630bd367c49
-
Size
715KB
-
MD5
fa910e128c46a5f9245b472d2dd2d157
-
SHA1
6a70f013a2458ecb1b8955b6275b81ea2c9ccbb9
-
SHA256
14f3aafe8b8d72786ddad65a08f41183ce60d525c1e2e570c1d98630bd367c49
-
SHA512
c0c0a71ab98b21f82193e553798a050b174b87b3d2ddf05c4c91db8942ece4cd9b0eb1e94d282da99e744abdca96698b5891d1fef4f6b43434a07984039e7ef2
-
SSDEEP
12288:TRsUpcHnXXzNkRKFfsAqdlVDczXZejbeAQjSY4VTZoLtq57kWjuNMfK:TRsSc3DGUFfpqdUzXM/GjS/VTZoIP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
14f3aafe8b8d72786ddad65a08f41183ce60d525c1e2e570c1d98630bd367c49.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3