Behavioral task
behavioral1
Sample
cdfb661392195b2bb1ab45dcb3c12a04cf6f5bc7e020fcbd851cd137a4e94fee.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cdfb661392195b2bb1ab45dcb3c12a04cf6f5bc7e020fcbd851cd137a4e94fee.xls
Resource
win10v2004-20240508-en
General
-
Target
cdfb661392195b2bb1ab45dcb3c12a04cf6f5bc7e020fcbd851cd137a4e94fee
-
Size
195KB
-
MD5
5acdac2f58fbdcbf87b08bca67cd3ce9
-
SHA1
b41ae953364b8a229ac9fa619922833749fe22d7
-
SHA256
cdfb661392195b2bb1ab45dcb3c12a04cf6f5bc7e020fcbd851cd137a4e94fee
-
SHA512
024b465982af9c4f5f82ee4daadaa00a7da84ef8bdc309f9960db7a0ec775724044a5b83e3c3b0cf7e1775235a813d0a24eee64d5e6aebf2e46270361c9fc343
-
SSDEEP
6144:lxEtjPOtioVjDGUU1qfDlavx+LkjU4urHTYO7GEhsSygBe3:PHscmSNg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
cdfb661392195b2bb1ab45dcb3c12a04cf6f5bc7e020fcbd851cd137a4e94fee.xls windows office2003