Behavioral task
behavioral1
Sample
1f50b1423a8af31d88a858a30fe2b493451feed1f1082ab51f008fdea18e4b8b.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f50b1423a8af31d88a858a30fe2b493451feed1f1082ab51f008fdea18e4b8b.xls
Resource
win10v2004-20240611-en
General
-
Target
1f50b1423a8af31d88a858a30fe2b493451feed1f1082ab51f008fdea18e4b8b
-
Size
105KB
-
MD5
0b4b62096fb3d60505844b438893a5d7
-
SHA1
80f1082b9ddb40aa59456853ba6cfe90882a4d0e
-
SHA256
1f50b1423a8af31d88a858a30fe2b493451feed1f1082ab51f008fdea18e4b8b
-
SHA512
c8bed5f7fd93f22cd8ec98565cbbfa625c55f9e44f4189bbf3a97aaaca0b3be10c45d23428ccaee9c88d885d68527133e20ca5161aa43656330abc7105cce22f
-
SSDEEP
768:HFpPryIocNc7O6Qs8PDNoQfBcoIqgZ9sEGqbyo5d:TPry3hQfJk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1f50b1423a8af31d88a858a30fe2b493451feed1f1082ab51f008fdea18e4b8b.xls windows office2003