Behavioral task
behavioral1
Sample
902ae5af92e9b991608119a286691fc8a0eaeb6eaffab73a05aeddaf19f42da7.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
902ae5af92e9b991608119a286691fc8a0eaeb6eaffab73a05aeddaf19f42da7.xls
Resource
win10v2004-20240709-en
General
-
Target
902ae5af92e9b991608119a286691fc8a0eaeb6eaffab73a05aeddaf19f42da7
-
Size
217KB
-
MD5
68637ce70344b699118ecc6911a4d604
-
SHA1
2deb03b8b0cc94ae4afdded07c413f5042b11450
-
SHA256
902ae5af92e9b991608119a286691fc8a0eaeb6eaffab73a05aeddaf19f42da7
-
SHA512
56a4853173335f3791e3e1c6b076112005fb29cee97b8b5a9d90e0286c44f982fbae3b2ac38cb4e18ae00efc11dac86727744deb06b797c9aa120de1d4d33be3
-
SSDEEP
6144:QnFPRnKYqUaAMOwm8m/5DJfxNfHIxEtjPOtioVjDGUU1qfDlavx+W/IE3pqfr0:N
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
902ae5af92e9b991608119a286691fc8a0eaeb6eaffab73a05aeddaf19f42da7.xls windows office2003