Behavioral task
behavioral1
Sample
004732b4bfd09a7ef06efb1b2ff3641b12fe874bb49527569d548c7758ca1199.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
004732b4bfd09a7ef06efb1b2ff3641b12fe874bb49527569d548c7758ca1199.xls
Resource
win10v2004-20240802-en
General
-
Target
004732b4bfd09a7ef06efb1b2ff3641b12fe874bb49527569d548c7758ca1199
-
Size
30KB
-
MD5
fb00767408296731e17e0338a415127f
-
SHA1
dec36c74b20cd9c9b3365ba34d796dc9306448ca
-
SHA256
004732b4bfd09a7ef06efb1b2ff3641b12fe874bb49527569d548c7758ca1199
-
SHA512
0620813d174d44698fd24f83cc425291ed947211030517d54ce374f1890a2cf6c15f0be1e4a0ae0ad019793d9b3161a7a02a558d656887ac0c8934fdd9dd523e
-
SSDEEP
768:sik3hOdsylKlgryzc4bNhZFGzE+cL2knAJ6OiCkhaBwAo946B8R:pk3hOdsylKlgryzc4bNhZFGzE+cL2knm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
004732b4bfd09a7ef06efb1b2ff3641b12fe874bb49527569d548c7758ca1199.xls windows office2003
Module1
ThisWorkbook
Sheet1