Behavioral task
behavioral1
Sample
99ee3de5b1ff1665708ca47338eeb389824cc07af1273abe31c7b7a05facfee4.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
99ee3de5b1ff1665708ca47338eeb389824cc07af1273abe31c7b7a05facfee4.xls
Resource
win10v2004-20240709-en
General
-
Target
99ee3de5b1ff1665708ca47338eeb389824cc07af1273abe31c7b7a05facfee4
-
Size
52KB
-
MD5
86f2a9879de336b1c983755b2615f926
-
SHA1
19250c71f3eb28a6b4e3febef6dfa47a30e3342e
-
SHA256
99ee3de5b1ff1665708ca47338eeb389824cc07af1273abe31c7b7a05facfee4
-
SHA512
d37da87e8a2e65b17f138540283e005b68016c7a2688889f621858b06cf1362cab8d21a91a4e99c47b87ec996e31c1813a389f45418eee45f91620800e987bcc
-
SSDEEP
1536:0fxEtjPOtioVjDGUU1qfDlaGGx+cMdg6boobYGF7:0fxEtjPOtioVjDGUU1qfDlaGGx+cMdgw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
99ee3de5b1ff1665708ca47338eeb389824cc07af1273abe31c7b7a05facfee4.xls windows office2003
ThisWorkbook
Sheet1