Behavioral task
behavioral1
Sample
ab46f084d7f773eca3e6aa36fab89a8436650921c092bd78dd1d973a3cc0f4f9.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab46f084d7f773eca3e6aa36fab89a8436650921c092bd78dd1d973a3cc0f4f9.xls
Resource
win10v2004-20240709-en
General
-
Target
ab46f084d7f773eca3e6aa36fab89a8436650921c092bd78dd1d973a3cc0f4f9
-
Size
66KB
-
MD5
8b5a2b3d673324be1e5f10c522313203
-
SHA1
cfeba79a43903aee4ec560568d7b5320766aa5eb
-
SHA256
ab46f084d7f773eca3e6aa36fab89a8436650921c092bd78dd1d973a3cc0f4f9
-
SHA512
1e59f96ead7440d8aa17aac9f7ab07aea247342be6c17bd88b8687362d7c0d1552912a29a373894e1f6cc6a07ce9c7a1f12980771ef78f7cb33a131b889b5438
-
SSDEEP
1536:GjxEtjPOtioVjDGUU1qfDlaGGx+fdwI5tNhRlnYOdpSIC9dX6:GjxEtjPOtioVjDGUU1qfDlaGGx+fdwIt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ab46f084d7f773eca3e6aa36fab89a8436650921c092bd78dd1d973a3cc0f4f9.xls windows office2003