Behavioral task
behavioral1
Sample
7c4b32f964b516b90ce762dbbc2e7f64d6ad0e69fbc2379037d61e15b642d1b9.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c4b32f964b516b90ce762dbbc2e7f64d6ad0e69fbc2379037d61e15b642d1b9.xls
Resource
win10v2004-20240802-en
General
-
Target
7c4b32f964b516b90ce762dbbc2e7f64d6ad0e69fbc2379037d61e15b642d1b9
-
Size
37KB
-
MD5
f42025a6593369739ee8c6c6b94d7842
-
SHA1
114fefebfeecaf4eb991556d48aabbfe1d7274a2
-
SHA256
7c4b32f964b516b90ce762dbbc2e7f64d6ad0e69fbc2379037d61e15b642d1b9
-
SHA512
0aea9b2810c98cccc9afa5ceba0270be4807f55abd4789915c31fb852b09f1e9f752b110ea3a5222de73679276c4f8e635ff49c8093eb16341e65cc81ea44906
-
SSDEEP
768:lYq/mRk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJqNQ+zt+AmciQ:fck3hbdlylKsgqopeJBWhZFGkE+cL2Nw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7c4b32f964b516b90ce762dbbc2e7f64d6ad0e69fbc2379037d61e15b642d1b9.xls windows office2003