Behavioral task
behavioral1
Sample
2c4d815e5b016d823766c862bf8fd18ba45e1c381ce77e99899451891cd69bfd.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c4d815e5b016d823766c862bf8fd18ba45e1c381ce77e99899451891cd69bfd.xls
Resource
win10v2004-20240802-en
General
-
Target
2c4d815e5b016d823766c862bf8fd18ba45e1c381ce77e99899451891cd69bfd
-
Size
4.0MB
-
MD5
655eb4180133414522d355d8de4444b3
-
SHA1
aaa9e2d472fe49814181c0409a469e2d0297a0c6
-
SHA256
2c4d815e5b016d823766c862bf8fd18ba45e1c381ce77e99899451891cd69bfd
-
SHA512
fc456353bb3db36900048cd0cc35889b35c19f7973f6c8c95df6a44c5573ae7f1f9f234c1579463587df7a97aa22bee893adbf63b78b812604bfeed7fa1407e7
-
SSDEEP
24576:90tslYe5RxIufjTnnO+LwQgS7HJ6ZA4jvhmz6nrBpiLr5P9:F3IuLTnnO+sQgS7EG4jvhjGR1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2c4d815e5b016d823766c862bf8fd18ba45e1c381ce77e99899451891cd69bfd.xls windows office2003