Behavioral task
behavioral1
Sample
24c89d5cbc51fbb3745f0df7d6008ac75b6b961ae4e15251d63a092d1bfa9775.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
24c89d5cbc51fbb3745f0df7d6008ac75b6b961ae4e15251d63a092d1bfa9775.xls
Resource
win10v2004-20240709-en
General
-
Target
24c89d5cbc51fbb3745f0df7d6008ac75b6b961ae4e15251d63a092d1bfa9775
-
Size
76KB
-
MD5
c3703bd0bda7d6942f228ee1e6393066
-
SHA1
523eaf38754ad0d3892014a91e84d8e5528b950c
-
SHA256
24c89d5cbc51fbb3745f0df7d6008ac75b6b961ae4e15251d63a092d1bfa9775
-
SHA512
9cffaa1285d7a5ddff4282f0f61c23a36f0a722a5d70576082713073b29d79729bb19a5cbe18f96a4a4ade88d789dc8309e1c4f7c97fa3386e1f1efc515b12e3
-
SSDEEP
1536:PTxEtjPOtioVjZUGGnwfDlaGGx+cW/IG2zsIhqABU+qeiSHwsD0wKir+mci9:PTxEtjPOtioVjZUGGnwfDlaGGx+cW/IL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
24c89d5cbc51fbb3745f0df7d6008ac75b6b961ae4e15251d63a092d1bfa9775.xls windows office2003