Behavioral task
behavioral1
Sample
147b2c7e36d03e5c5923f5b60c1328f731bfef3b8b610f91dc9080c11d822257.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
147b2c7e36d03e5c5923f5b60c1328f731bfef3b8b610f91dc9080c11d822257.xls
Resource
win10v2004-20240704-en
General
-
Target
147b2c7e36d03e5c5923f5b60c1328f731bfef3b8b610f91dc9080c11d822257
-
Size
34KB
-
MD5
0301625d29d7ef9f04e37a388228e31e
-
SHA1
c3b02654ad696f5cf0ab218367f2395683638026
-
SHA256
147b2c7e36d03e5c5923f5b60c1328f731bfef3b8b610f91dc9080c11d822257
-
SHA512
a17d2511e3b17f4b6bed4d78d66b53e3084a4d3b6fa7814b4daa7fc65a89e68b1666277fd822d4ee5de69d929e431a38e5cb23fe1f8d12e697c82b8f5e271f15
-
SSDEEP
768:NveWFwP+SKabAk0BuqCXlg+/fs5cClfZw2gmVXqA4LQYgO1mQQpSFeVAmcil:1SP+SKabAk0BuqCXlg+/fs5cClfZw2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
147b2c7e36d03e5c5923f5b60c1328f731bfef3b8b610f91dc9080c11d822257.xls .vbs windows office2003 polyglot