Behavioral task
behavioral1
Sample
b0793e4eeb8d372735baf50773ac2b4cc1b1852c96122cd6da93213a9cd1d5f8.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0793e4eeb8d372735baf50773ac2b4cc1b1852c96122cd6da93213a9cd1d5f8.xls
Resource
win10v2004-20240802-en
General
-
Target
b0793e4eeb8d372735baf50773ac2b4cc1b1852c96122cd6da93213a9cd1d5f8
-
Size
283KB
-
MD5
fc525da8ee579b5b06f28c653a992eb6
-
SHA1
7008cda719703ccb46ace9bda74eb0e30f75e81f
-
SHA256
b0793e4eeb8d372735baf50773ac2b4cc1b1852c96122cd6da93213a9cd1d5f8
-
SHA512
ce755177e8d4020a569da3dc04d29e642210ce814a15cf60102063a01128b903995ab40421e71161a45f5c1f96902de463d006b9ae90af9e03dce9902efa62f6
-
SSDEEP
6144:E8mdr74qRlm5ibfVdL3UikJdGC1XcONnxusA2:E8UrDtd7UfPTfV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b0793e4eeb8d372735baf50773ac2b4cc1b1852c96122cd6da93213a9cd1d5f8.xls windows office2003
l1
bb
Module1
UserForm1