Behavioral task
behavioral1
Sample
343862856b2c89abdcaf48f9a55b80e5eb23a87459b9d9f076952472afe4542e.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
343862856b2c89abdcaf48f9a55b80e5eb23a87459b9d9f076952472afe4542e.xls
Resource
win10v2004-20240508-en
General
-
Target
343862856b2c89abdcaf48f9a55b80e5eb23a87459b9d9f076952472afe4542e
-
Size
64KB
-
MD5
abc9d43132500e852aca9a4ca24275fc
-
SHA1
8c41b3a3b4d3d2497bc5b7484107f7a318256f66
-
SHA256
343862856b2c89abdcaf48f9a55b80e5eb23a87459b9d9f076952472afe4542e
-
SHA512
ed7ec6df8adb06acb07ee8c740218d917016bac69e120f1177bbebce96de3ccd7e439d29123cbd2b518868a13b6cdc25d71771d8f1d883871b2189996cbcfb17
-
SSDEEP
1536:8k3hOdsylKlgxopeiBNhZFGzEpnoUjBLtQnSUYRFU6CdUJhwxrpmsiI:8k3hOdsylKlgxopeiBNhZFGzEpnoUjB9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
343862856b2c89abdcaf48f9a55b80e5eb23a87459b9d9f076952472afe4542e.xls windows office2003