Behavioral task
behavioral1
Sample
bf0ccca1e7eec07825c13d7162aa612df05bc063d73ce54dcb441e39a3f0c0b7.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bf0ccca1e7eec07825c13d7162aa612df05bc063d73ce54dcb441e39a3f0c0b7.xls
Resource
win10v2004-20240508-en
General
-
Target
bf0ccca1e7eec07825c13d7162aa612df05bc063d73ce54dcb441e39a3f0c0b7
-
Size
38KB
-
MD5
54d1a930cdb3a6967fe7d5430f416f33
-
SHA1
91433efd109b980432377e00bd583a3f37ead11c
-
SHA256
bf0ccca1e7eec07825c13d7162aa612df05bc063d73ce54dcb441e39a3f0c0b7
-
SHA512
6800ed38da216d099c14b37c35dbe135397f066e84db8d31e96a2bcfc7aa0bfd3410e091d59c4c0c8473eb797822227efd5fcb9d0f87052f320890c0e28ca361
-
SSDEEP
768:ULHhoCaSEpkDkcqBaScfPoIOhqqcT8Eyxyzk3hbdlylKsgqopeJBWhZFGkE+cLaI:KhoCabpkDkcqBaScfPoIOhqqcT8Eyxyl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
bf0ccca1e7eec07825c13d7162aa612df05bc063d73ce54dcb441e39a3f0c0b7.xls windows office2003