Behavioral task
behavioral1
Sample
6b997e0f1f6a7967d7d6884a10d0a689a3b3ceb9a9a42ec9a4d159372e540ce2.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b997e0f1f6a7967d7d6884a10d0a689a3b3ceb9a9a42ec9a4d159372e540ce2.xls
Resource
win10v2004-20240508-en
General
-
Target
6b997e0f1f6a7967d7d6884a10d0a689a3b3ceb9a9a42ec9a4d159372e540ce2
-
Size
614KB
-
MD5
35c38f3878081f8875b196a8d8e252ea
-
SHA1
045b80614ea99d88ee2437dd9438271ac0ed038b
-
SHA256
6b997e0f1f6a7967d7d6884a10d0a689a3b3ceb9a9a42ec9a4d159372e540ce2
-
SHA512
e2d4f36d52273a163d839a14bca73f66d13c52c227dd363a4fa5c987c166e3e6921887231c9e0b5a2931fd990dd1641203cab8c1418e1ec2d09367a50f6af030
-
SSDEEP
12288:vWs20Typ2io4AeboqyN5+uAJPkDj9s/qYXJL9DwbQBLj:djY2Yr9Pj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
6b997e0f1f6a7967d7d6884a10d0a689a3b3ceb9a9a42ec9a4d159372e540ce2.xls windows office2003