Behavioral task
behavioral1
Sample
b08d7f5b855a7bdee8687b85421059e32bda031d71ae7a650228865aaeeb179d.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b08d7f5b855a7bdee8687b85421059e32bda031d71ae7a650228865aaeeb179d.xls
Resource
win10v2004-20240704-en
General
-
Target
b08d7f5b855a7bdee8687b85421059e32bda031d71ae7a650228865aaeeb179d
-
Size
34KB
-
MD5
b006e610d3b0fc6476b354fd84a15056
-
SHA1
a0910b9da944e4793657814c867c3db569c568a0
-
SHA256
b08d7f5b855a7bdee8687b85421059e32bda031d71ae7a650228865aaeeb179d
-
SHA512
a1a3f4a9db2ea68b2de80636aba00714b8152cf83bfece13d7d65d73e2a5f2e3381171646189d5476af939f4f5d406aa6a030b6073654ea9d73af79132f96569
-
SSDEEP
768:5veWFwP+SKabAk0BuqCXlg+/fs5cClfZw2gmVXqA4LQYgO1mQQpSFeVAmcil:ZSP+SKabAk0BuqCXlg+/fs5cClfZw2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b08d7f5b855a7bdee8687b85421059e32bda031d71ae7a650228865aaeeb179d.xls .vbs windows office2003 polyglot