Behavioral task
behavioral1
Sample
27c6cf2923f57d8add450f2c8a37c8b242e5a707f90d7dee4498f42d18c2e064.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27c6cf2923f57d8add450f2c8a37c8b242e5a707f90d7dee4498f42d18c2e064.xls
Resource
win10v2004-20240611-en
General
-
Target
27c6cf2923f57d8add450f2c8a37c8b242e5a707f90d7dee4498f42d18c2e064
-
Size
715KB
-
MD5
80de205919577fea74c6f325dee78829
-
SHA1
edc3a56394a3a3940f16efb1fb43147d16fbf92c
-
SHA256
27c6cf2923f57d8add450f2c8a37c8b242e5a707f90d7dee4498f42d18c2e064
-
SHA512
9f8e31aa87d63794cfc1779c2fa6c27dd687adcd5212d628531f6be6d201896e9a82191d11c057f8e52d518d4d005451d28c282cbe129be22ae7ca78e42e3906
-
SSDEEP
12288:aRsUpcHnXXzNkRKFfsAqdlVDczXZejbeAQjSY4VTZoLtq57kWjuNMfK:aRsSc3DGUFfpqdUzXM/GjS/VTZoIP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
27c6cf2923f57d8add450f2c8a37c8b242e5a707f90d7dee4498f42d18c2e064.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3