Behavioral task
behavioral1
Sample
77562b27e5b7fecdb9e1953d3c599fb5d0b9fc0c631ad0f6fcc46fc1785b8187.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77562b27e5b7fecdb9e1953d3c599fb5d0b9fc0c631ad0f6fcc46fc1785b8187.xls
Resource
win10v2004-20240709-en
General
-
Target
77562b27e5b7fecdb9e1953d3c599fb5d0b9fc0c631ad0f6fcc46fc1785b8187
-
Size
208KB
-
MD5
a164c4d4ab163ae3e158b5a1dd790ee9
-
SHA1
f0e73e1f85dcf70f0e949cf2e068f5923bba7a0a
-
SHA256
77562b27e5b7fecdb9e1953d3c599fb5d0b9fc0c631ad0f6fcc46fc1785b8187
-
SHA512
c762d381e61aaea89f55ff4c70de35306c57d2c904c74fe1c686c31bfc44b1e3c0cadbc5300a104b56b4c13307cfdda71bd3d9f360bbe0ba01534cf8c975f3c3
-
SSDEEP
6144:k5vFf5su4ukujlvFztVzNfNjHD3DBk3hOdsylKlgxopeiBNhZF+E+oWxM3JAduFj:ylRzR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
77562b27e5b7fecdb9e1953d3c599fb5d0b9fc0c631ad0f6fcc46fc1785b8187.xls windows office2003