Behavioral task
behavioral1
Sample
0c9bbfe06ecee6221b60d7bf848ccf28082443b298c9a195ea2925762a44948d.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0c9bbfe06ecee6221b60d7bf848ccf28082443b298c9a195ea2925762a44948d.xls
Resource
win10v2004-20240709-en
General
-
Target
0c9bbfe06ecee6221b60d7bf848ccf28082443b298c9a195ea2925762a44948d
-
Size
99KB
-
MD5
8339ae16cfd275fc359f415349733925
-
SHA1
23015e97c1d3357841033187384c9944e8e7da1d
-
SHA256
0c9bbfe06ecee6221b60d7bf848ccf28082443b298c9a195ea2925762a44948d
-
SHA512
299f0656c4a9c2d22d07dd71310f6f7493b6fd096f82583557b2db1ffc4fcb7e92835cd2b6b12b56cb7dd0e4c70e1ef5be11738d16e3aec9e4348a74567f72a7
-
SSDEEP
3072:eHMk3hOd64vw/WbmfgkfjD/PkzSg4n3MUiizOzT6/+mGs:Fk3hOd64vw/WbmfgkfjD/P0SgC3MUiQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0c9bbfe06ecee6221b60d7bf848ccf28082443b298c9a195ea2925762a44948d.xls windows office2003