Behavioral task
behavioral1
Sample
917c58c98f0e3ed26d8469d837bc742acea2943e07577a0cda204aca625a79e9.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
917c58c98f0e3ed26d8469d837bc742acea2943e07577a0cda204aca625a79e9.xls
Resource
win10v2004-20240704-en
General
-
Target
917c58c98f0e3ed26d8469d837bc742acea2943e07577a0cda204aca625a79e9
-
Size
34KB
-
MD5
3f441c316221ad1ed4a3464a21467797
-
SHA1
3c2941a3a4023fffde1603f047b45abb9753d6f3
-
SHA256
917c58c98f0e3ed26d8469d837bc742acea2943e07577a0cda204aca625a79e9
-
SHA512
977551185894666d9830d80a3dff30be68b3d3da79886e95a885333fe69d04b1835502c2c4ae4e0b8bb42072669945c391bfb6d42fd1609e4fcd1ae0ad854664
-
SSDEEP
768:TveWFwP+SKabAk0BuqCXlg+/fs5cClfZw2gmVXqA4LQYgO1mQQpSFeVAmcil:TSP+SKabAk0BuqCXlg+/fs5cClfZw2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
917c58c98f0e3ed26d8469d837bc742acea2943e07577a0cda204aca625a79e9.xls .vbs windows office2003 polyglot