Behavioral task
behavioral1
Sample
e92b0b1de4d599033fe6bb687122f5a90e50add363dcac6ebf84491e4dabdfdd.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e92b0b1de4d599033fe6bb687122f5a90e50add363dcac6ebf84491e4dabdfdd.xls
Resource
win10v2004-20240611-en
General
-
Target
e92b0b1de4d599033fe6bb687122f5a90e50add363dcac6ebf84491e4dabdfdd
-
Size
37KB
-
MD5
fd2cceefc05b49e82bfc75215ffaf21d
-
SHA1
3570016f813ff125b5feb7450976bd1aae1a2342
-
SHA256
e92b0b1de4d599033fe6bb687122f5a90e50add363dcac6ebf84491e4dabdfdd
-
SHA512
5e36af791cbde8e2fef5812043831a322ecc18b1386376b88674e00319ea2bf55f41bd176c44f3a71155b5011c7323675bcf207780fd658d596f19f26e282ec5
-
SSDEEP
768:uGmk3hOdsylKlgxopeiBNhZFGzE+cL2kdAJr4Jets+mW8+vaUm:Ik3hOdsylKlgxopeiBNhZFGzE+cL2kdY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e92b0b1de4d599033fe6bb687122f5a90e50add363dcac6ebf84491e4dabdfdd.xls .js windows office2003 polyglot