Behavioral task
behavioral1
Sample
dd97129e94000f5f467c3797dd9e1074c562dad6f709bdafd800457059092799.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
dd97129e94000f5f467c3797dd9e1074c562dad6f709bdafd800457059092799.xls
Resource
win10v2004-20240709-en
General
-
Target
dd97129e94000f5f467c3797dd9e1074c562dad6f709bdafd800457059092799
-
Size
44KB
-
MD5
4e363af1fcc0f04fb9d4cde0b0bbbcd9
-
SHA1
fd84075be650172bd63ffd1b8088c220a72df440
-
SHA256
dd97129e94000f5f467c3797dd9e1074c562dad6f709bdafd800457059092799
-
SHA512
af1f3c6eb65e0cbd73aa1a20350b4c8bd720c7ff558e6c7481fd010109b58c7f8a0d372ce6c604be5f76d6bb7a1dea67f3a7b7e8cbe88072947eac64a41e81d8
-
SSDEEP
384:BUm0WhC/9zybZN5iS9yFGZv2x8rW9oXS5kT+lQ/6hM7mN4fJ0jO1gPKxcL2dI3yG:BHIzybZJsCBNk4p0Na36
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
dd97129e94000f5f467c3797dd9e1074c562dad6f709bdafd800457059092799.xls windows office2003