Behavioral task
behavioral1
Sample
3297cda8a3e1de969d300202240e1c316c0871672ecf100398dcaed6e250b91f.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3297cda8a3e1de969d300202240e1c316c0871672ecf100398dcaed6e250b91f.xls
Resource
win10v2004-20240709-en
General
-
Target
3297cda8a3e1de969d300202240e1c316c0871672ecf100398dcaed6e250b91f
-
Size
44KB
-
MD5
b75dae098a846caae18bc0ae984a5b52
-
SHA1
17a7877df1dbac2810a6ec1890a63073243ee69e
-
SHA256
3297cda8a3e1de969d300202240e1c316c0871672ecf100398dcaed6e250b91f
-
SHA512
13af58092c916530c0f3abb923496832aade6086a9ea1f0eff771a1f652667e551585a40aa1c5f27ebe56f032612398b8afcf90a92099b19885da1d38ab63a42
-
SSDEEP
768:rx4BIpvfM7k6PqiintxU/6v2cT20yf+zh3NpCBR1aAL0qnwKppgHNAB4AASDyKqG:t4BIpvfM7k6PqiintxU/6+cT20yf+zhE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3297cda8a3e1de969d300202240e1c316c0871672ecf100398dcaed6e250b91f.xls windows office2003