Behavioral task
behavioral1
Sample
c62ec9762eb560d63a2e26c14e110108c9b3855acdec2d19be16a38e7de79556.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c62ec9762eb560d63a2e26c14e110108c9b3855acdec2d19be16a38e7de79556.xls
Resource
win10v2004-20240709-en
General
-
Target
c62ec9762eb560d63a2e26c14e110108c9b3855acdec2d19be16a38e7de79556
-
Size
46KB
-
MD5
f583f1fec89fa531e8a8e006aad63fba
-
SHA1
333ac710fea4b316498d38385be987cfa5dd4a3b
-
SHA256
c62ec9762eb560d63a2e26c14e110108c9b3855acdec2d19be16a38e7de79556
-
SHA512
ac1d1fae18accf2d092b4c4860bc3828cb23ba2758962f09aa8c2e9e9028b388c55340971bfed760188ee57817b0163d9ede31d1910feac26f9cf3df95e7919f
-
SSDEEP
768:XnNhG28vYmP+3xEtjPOtioVjDGUU1qfDlaGGx+chYIxWcQIBUTlV9OfjYAcwSRYp:XNhG28v5exEtjPOtioVjDGUU1qfDlaGG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c62ec9762eb560d63a2e26c14e110108c9b3855acdec2d19be16a38e7de79556.xls windows office2003