Behavioral task
behavioral1
Sample
fd44d3a0c6dd879431f0f90dc05232464038089cafcfc91c40818ffaede86bea.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fd44d3a0c6dd879431f0f90dc05232464038089cafcfc91c40818ffaede86bea.xls
Resource
win10v2004-20240508-en
General
-
Target
fd44d3a0c6dd879431f0f90dc05232464038089cafcfc91c40818ffaede86bea
-
Size
79KB
-
MD5
25a41b2bd997c62aac3a176ed09a449d
-
SHA1
95dd53cee1325defdd3ec14fbefc6d366383944b
-
SHA256
fd44d3a0c6dd879431f0f90dc05232464038089cafcfc91c40818ffaede86bea
-
SHA512
a22f14a43431a3fa99fc9d029233925f75b800246f4fb27515e04a49d3936fdd55512f472d021511ac1b597407ac3a52fb033b8cc159c4619bf14d3f8c1127e4
-
SSDEEP
768:m3JFW0Fnv0+s+fPXrZpe3YsCW6flqXrZp0ZCs83RWg7WiD3vHB:4sUrZpetCWwurZp0p84g7H
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
fd44d3a0c6dd879431f0f90dc05232464038089cafcfc91c40818ffaede86bea.xls windows office2003