Behavioral task
behavioral1
Sample
7161561927c7e31e0f5ffb2a4b8eecf913c7bec3e6f253e0aa6531cab479a25c.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7161561927c7e31e0f5ffb2a4b8eecf913c7bec3e6f253e0aa6531cab479a25c.xls
Resource
win10v2004-20240802-en
General
-
Target
7161561927c7e31e0f5ffb2a4b8eecf913c7bec3e6f253e0aa6531cab479a25c
-
Size
194KB
-
MD5
980be267564110d10ca8b8ef6061c343
-
SHA1
873596eabaee89538fb05860b728294824766dfe
-
SHA256
7161561927c7e31e0f5ffb2a4b8eecf913c7bec3e6f253e0aa6531cab479a25c
-
SHA512
b70345a8f744018a0445c93c32f557b8533ad2db6c4b283e9129a50280511dab6d246e35347b4cb549b08b28131563fb258f17f73cbd74e59f9cd97d5d460ac2
-
SSDEEP
3072:ZyyW1WG1JNNlks2OSVg/FAnKtlsxhiDKMpnyl:n
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7161561927c7e31e0f5ffb2a4b8eecf913c7bec3e6f253e0aa6531cab479a25c.xls windows office2003