Behavioral task
behavioral1
Sample
d3540c4ed29999b8a604d7515fccd976ad37cf2da35d6ae57c34ab9125d6ebbb.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d3540c4ed29999b8a604d7515fccd976ad37cf2da35d6ae57c34ab9125d6ebbb.xls
Resource
win10v2004-20240709-en
General
-
Target
d3540c4ed29999b8a604d7515fccd976ad37cf2da35d6ae57c34ab9125d6ebbb
-
Size
38KB
-
MD5
6618942e89021f331c2e2cccd89cd125
-
SHA1
777c7968f5fe32dcc403f25c9c309559c636a655
-
SHA256
d3540c4ed29999b8a604d7515fccd976ad37cf2da35d6ae57c34ab9125d6ebbb
-
SHA512
de10e20a02b65d149e460562dac60c43e5f47eb7306cef2b81dc9802818f98461345b8131816a44a099aaa8bfc7bdbba5f7f73e7120700c4ee1c3e0cd6cab7c0
-
SSDEEP
768:QtZSxMshszgkWRctde2Q/v5erEK2v1G4RYZqIGAO29bnKU9fUWTIK2/V/tn:QtC/szgkWRctde2Q/v5erEK2v1G4RYZK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d3540c4ed29999b8a604d7515fccd976ad37cf2da35d6ae57c34ab9125d6ebbb.xls windows office2003