Behavioral task
behavioral1
Sample
bb3fc70922cd4b2f8f990fedebcec36b86e4008108a5e6dab0fdde2f18b2ea0d.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
bb3fc70922cd4b2f8f990fedebcec36b86e4008108a5e6dab0fdde2f18b2ea0d.xls
Resource
win10v2004-20240508-en
General
-
Target
bb3fc70922cd4b2f8f990fedebcec36b86e4008108a5e6dab0fdde2f18b2ea0d
-
Size
34KB
-
MD5
6a11475614061e3ea1972c49857cbddc
-
SHA1
8cccf3621f899353e6fd1d9f3aaa02f853063151
-
SHA256
bb3fc70922cd4b2f8f990fedebcec36b86e4008108a5e6dab0fdde2f18b2ea0d
-
SHA512
2e6937bfdf53db5fc974eaaa692cde6b984858fcb15affdbca410bda060bc9dec42073122cf43a96b2aec631d6e5a023674d9da7b7f66f55c334b56be40ed912
-
SSDEEP
768:eveWFwP+SKabAk0BuqCXlg+/fs5cClfZw2gmVXqA4LQYgO1mQQpSFeVAmcil:aSP+SKabAk0BuqCXlg+/fs5cClfZw2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bb3fc70922cd4b2f8f990fedebcec36b86e4008108a5e6dab0fdde2f18b2ea0d.xls .vbs windows office2003 polyglot