Behavioral task
behavioral1
Sample
2ce4f0a62a8fcc1d3c24240568247ef81a376819b82c9dfad3a19a7a36ff614e.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ce4f0a62a8fcc1d3c24240568247ef81a376819b82c9dfad3a19a7a36ff614e.xls
Resource
win10v2004-20240709-en
General
-
Target
2ce4f0a62a8fcc1d3c24240568247ef81a376819b82c9dfad3a19a7a36ff614e
-
Size
3.7MB
-
MD5
8b24aea8086fdcb6f8377890f6a3db66
-
SHA1
1496811fe14872ecf106aaedb05d528f9a022708
-
SHA256
2ce4f0a62a8fcc1d3c24240568247ef81a376819b82c9dfad3a19a7a36ff614e
-
SHA512
f93d4a5d5998a287a1b3a34a39962a0686d3b0bd0ef60e528c72a0339842a7abd82f7380a8bb8afc1150c059aecac6b7a6fedbb6e9521b24a9e33f75ef3ec53f
-
SSDEEP
98304:mXP6dzsOx16dORwHDTEK8a3X9o6Dn2TIlWjhs:mXidzB6KUDTCCy66Tns
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2ce4f0a62a8fcc1d3c24240568247ef81a376819b82c9dfad3a19a7a36ff614e.xls windows office2003