Behavioral task
behavioral1
Sample
fd2fddac28e488ccf7969da8aa85ade82b083243fe90edeec6eb09caa7a33bfa.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd2fddac28e488ccf7969da8aa85ade82b083243fe90edeec6eb09caa7a33bfa.xls
Resource
win10v2004-20240802-en
General
-
Target
fd2fddac28e488ccf7969da8aa85ade82b083243fe90edeec6eb09caa7a33bfa
-
Size
652KB
-
MD5
54de109b97458e0553be2427293e9e89
-
SHA1
0949f143352b6f17a76a0ee26581ae7acc6a183f
-
SHA256
fd2fddac28e488ccf7969da8aa85ade82b083243fe90edeec6eb09caa7a33bfa
-
SHA512
6b2c08b4e5e79b558e244895fb7c445e82c115de83176733dc1188a5136289229791e1a77eb9f0769ea4183d503879dfa0eae594a60ebe0082321f24fde4ef01
-
SSDEEP
3072:zPPPPctEU5UfsEY2HWUUZHPMixhtumlskJJQ40nEg9IMRVRLMyenUdqcm/id0edC:gJURIjxLumakJj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fd2fddac28e488ccf7969da8aa85ade82b083243fe90edeec6eb09caa7a33bfa.xls windows office2003