Behavioral task
behavioral1
Sample
95d670b6c1a0cf3d9ac9c017eac9fd23b443716ec8edcba07e76f16b9e38c8eb.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95d670b6c1a0cf3d9ac9c017eac9fd23b443716ec8edcba07e76f16b9e38c8eb.xls
Resource
win10v2004-20240709-en
General
-
Target
95d670b6c1a0cf3d9ac9c017eac9fd23b443716ec8edcba07e76f16b9e38c8eb
-
Size
44KB
-
MD5
02db61a5b1ea615046f7f7f4ca2ae515
-
SHA1
6bee2a917634a2ee953c2d9807910dc4a9b2f5a9
-
SHA256
95d670b6c1a0cf3d9ac9c017eac9fd23b443716ec8edcba07e76f16b9e38c8eb
-
SHA512
77f844dc52c9c93cf7fef5b629eef45caf64168e696790c6d7b19adfa574bafd91c9f7bdf0093005ac35c496a59d29ef40a2f56b2aee916668bd44f1c8c658de
-
SSDEEP
768:1x4BIpvfM7k6PqiintxU/6v2cT20yf+zh3NpCBR1aAL0qnwKppgHNAB4AASDyKqG:H4BIpvfM7k6PqiintxU/6+cT20yf+zhE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
95d670b6c1a0cf3d9ac9c017eac9fd23b443716ec8edcba07e76f16b9e38c8eb.xls windows office2003