Behavioral task
behavioral1
Sample
a4a129f88f972a3ade58bba420d4463754ffc4fa8633d6ba7d18453d0abf32ec.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a4a129f88f972a3ade58bba420d4463754ffc4fa8633d6ba7d18453d0abf32ec.xls
Resource
win10v2004-20240802-en
General
-
Target
a4a129f88f972a3ade58bba420d4463754ffc4fa8633d6ba7d18453d0abf32ec
-
Size
1.2MB
-
MD5
47e28b082ecd04d6cf6856c7b62e047e
-
SHA1
ce5af8a8d7ae5a5316a9ddcc05e247110e1908b8
-
SHA256
a4a129f88f972a3ade58bba420d4463754ffc4fa8633d6ba7d18453d0abf32ec
-
SHA512
6ce78b6e812405a4143f2daa385e3a3e49c592a46ad5ada6400254530b2de14c811523709477faccc946de00236b083085f22333686299a25fb04871ce3042ea
-
SSDEEP
6144:c+Ga6WVia/zFzzJB4BI34aiQFadNF66ZJdMsQOW4XTev2fg2+/Em0ddYPoa7RH0t:c+Ga6WVia/zq8qGceEz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a4a129f88f972a3ade58bba420d4463754ffc4fa8633d6ba7d18453d0abf32ec.xls windows office2003