Behavioral task
behavioral1
Sample
d022ae1f3358ca9d9c14a906a50595ed721d63e6abd0a05ea0a04eac4442f916.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d022ae1f3358ca9d9c14a906a50595ed721d63e6abd0a05ea0a04eac4442f916.xls
Resource
win10v2004-20240802-en
General
-
Target
d022ae1f3358ca9d9c14a906a50595ed721d63e6abd0a05ea0a04eac4442f916
-
Size
26KB
-
MD5
7c3d4c985f5acfdae964a72f61558f99
-
SHA1
722eb645034e7f38d33decaf1ddab58abd509124
-
SHA256
d022ae1f3358ca9d9c14a906a50595ed721d63e6abd0a05ea0a04eac4442f916
-
SHA512
97b2e66ee3932223eed7d70b6207376608a31f6ac2ca7afe767b818aa7238bd834d3d64cde13910731d45365185ac6134492cca1e0c5da44b0f08a9dd065786b
-
SSDEEP
768:mP1k3hbdlylKsgqopeJBWhZFGkE+cL2NdAJavmvCv4KO:a1k3hbdlylKsgqopeJBWhZFGkE+cL2NO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d022ae1f3358ca9d9c14a906a50595ed721d63e6abd0a05ea0a04eac4442f916.xls .ps1 windows office2003 polyglot