Behavioral task
behavioral1
Sample
89dbb0e62b66305ca1fee67fa6832cf321ec12e636799c18e0d7e1aeddce8c35.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89dbb0e62b66305ca1fee67fa6832cf321ec12e636799c18e0d7e1aeddce8c35.xls
Resource
win10v2004-20240802-en
General
-
Target
89dbb0e62b66305ca1fee67fa6832cf321ec12e636799c18e0d7e1aeddce8c35
-
Size
151KB
-
MD5
57ae9a272db8afd8070654e33aad712e
-
SHA1
7d843ebfbc5f3c39fae771282397fb32167ec1c1
-
SHA256
89dbb0e62b66305ca1fee67fa6832cf321ec12e636799c18e0d7e1aeddce8c35
-
SHA512
17446c77f0fc0058a7b947c4460c362bccccc9262a9543a9680bc6c8ff83219319656853665e33a7b295e91908b31159bc7b9351271896791f0cc2d18815c6dd
-
SSDEEP
3072:hcKoSsxzNDZLDZjlbR868O8KlVH3dehvMqAPjxO5xyZUE5V5xtezEVg8/dg1Gx0n:hcKoSsxzNDZLDZjlbR868O8KlVH3dehD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
89dbb0e62b66305ca1fee67fa6832cf321ec12e636799c18e0d7e1aeddce8c35.xls windows office2003
dASFw3sggsffHNGFJ
JSe546sdgasdgdf
UserForm1
GasregaSRHA457urd
fgkwjkFGzaxd