Behavioral task
behavioral1
Sample
2ae4d463cd4df974d95288744d1bbf686b42db45896e6c0ad4917f7aab42f32d.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ae4d463cd4df974d95288744d1bbf686b42db45896e6c0ad4917f7aab42f32d.xls
Resource
win10v2004-20240709-en
General
-
Target
2ae4d463cd4df974d95288744d1bbf686b42db45896e6c0ad4917f7aab42f32d
-
Size
126KB
-
MD5
d89dfeaadf6cdf2b7ea3435644180b3a
-
SHA1
bc9767d6217daba21cfdf8ed7e8dba01742bf196
-
SHA256
2ae4d463cd4df974d95288744d1bbf686b42db45896e6c0ad4917f7aab42f32d
-
SHA512
928a0d467b79ba834f031e2a220c75e56017f7df7dba57be4a9ce274881f422683d70fdf39053c5f1496d1c59bb084fe6e8c0984d70b7740be49a1df631a560e
-
SSDEEP
1536:KdKcpx2Sk/8E3NEN1vn5jG685uUDf44fAg:8AxdEzvn5jb8cU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
2ae4d463cd4df974d95288744d1bbf686b42db45896e6c0ad4917f7aab42f32d.xls windows office2003
ЭтаКнига
Лист1
Лист2
Лист3
Class1
Class2
Class3
Class4
Class5
dfsdf
load
Module1
Module2
Module3
Module4
Module5
Module6
Module8
Module9
sdfdsf
sdfsdfsdf
sdfsdfsdffff