Behavioral task
behavioral1
Sample
c1e61dd7daa47d6344a7608783beca9f7af26c8968e4e0f9388a6d64a925a7e6.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c1e61dd7daa47d6344a7608783beca9f7af26c8968e4e0f9388a6d64a925a7e6.xls
Resource
win10v2004-20240508-en
General
-
Target
c1e61dd7daa47d6344a7608783beca9f7af26c8968e4e0f9388a6d64a925a7e6
-
Size
34KB
-
MD5
87d408a102439eaee226db63643a664c
-
SHA1
0cf4f76942379400d65d8bb8927198d36e55395c
-
SHA256
c1e61dd7daa47d6344a7608783beca9f7af26c8968e4e0f9388a6d64a925a7e6
-
SHA512
6d83560dfdcd3ce8ba61945a1d8e037eb1c568573c775983516fd034f2498124c9578857fcdc38a2198f0e60d5650976abf634f5df6780f68de61df9f69847cf
-
SSDEEP
768:cveWFwP+SKabAk0BuqCXlg+/fs5cClfZw2gmVXqA4LQYgO1mQQpSFeVAmcil:wSP+SKabAk0BuqCXlg+/fs5cClfZw2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c1e61dd7daa47d6344a7608783beca9f7af26c8968e4e0f9388a6d64a925a7e6.xls .vbs windows office2003 polyglot