Behavioral task
behavioral1
Sample
2e04ee671126d1601258f791fcc2fb780ffd045e1e71bb8ba8f777077557bb36.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e04ee671126d1601258f791fcc2fb780ffd045e1e71bb8ba8f777077557bb36.xls
Resource
win10v2004-20240709-en
General
-
Target
2e04ee671126d1601258f791fcc2fb780ffd045e1e71bb8ba8f777077557bb36
-
Size
39KB
-
MD5
63ccb6b97e4d0a4fd73148ec783b181e
-
SHA1
e14171e7f5858e9281a74fce1b781e9e1863161b
-
SHA256
2e04ee671126d1601258f791fcc2fb780ffd045e1e71bb8ba8f777077557bb36
-
SHA512
cb938e4eda946e84ecaa09d7e562792e237385295d9ebbd1743342a91868737dd3c3bff8ba1f60b2a21b92a46b19365c302594cb4f6f0ea6a43502423841f4b7
-
SSDEEP
384:gQxC/9zybqKA8QLiS9yFg9atjmqem/UmaV12NI4R:gHzybqKTE0Jem/DaGNV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2e04ee671126d1601258f791fcc2fb780ffd045e1e71bb8ba8f777077557bb36.xls windows office2003