Behavioral task
behavioral1
Sample
c4783d96241a8c55e072b15ac0701d3d52875eccc597c897755ce6a03a2a56a6.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4783d96241a8c55e072b15ac0701d3d52875eccc597c897755ce6a03a2a56a6.xls
Resource
win10v2004-20240709-en
General
-
Target
c4783d96241a8c55e072b15ac0701d3d52875eccc597c897755ce6a03a2a56a6
-
Size
57KB
-
MD5
a0152c0f69df2407aae8fe05d2d04aa2
-
SHA1
8ff24e31abc9cee162bcd0d180782b0c46ddcd40
-
SHA256
c4783d96241a8c55e072b15ac0701d3d52875eccc597c897755ce6a03a2a56a6
-
SHA512
cbd4d3af480676b1c9259eecc8985d3a4bdf0504e7970c37f6e20bde9782028bba3887979b90dfc5ab01a6ce97c199dd83fcba91c96f00284a4ef4cf7a3393f3
-
SSDEEP
1536:Kk3hOdsylKlgxopeiBNhZFGzE+ch/gGArA/u2nuggPB3sq:Kk3hOdsylKlgxopeiBNhZFGzE+ch/gGO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c4783d96241a8c55e072b15ac0701d3d52875eccc597c897755ce6a03a2a56a6.xls windows office2003