Behavioral task
behavioral1
Sample
9dcb1599842fa07db1a4c49ce14278a7fd7c1b5a925cf28eda769835e6f5d4cd.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9dcb1599842fa07db1a4c49ce14278a7fd7c1b5a925cf28eda769835e6f5d4cd.xls
Resource
win10v2004-20240802-en
General
-
Target
9dcb1599842fa07db1a4c49ce14278a7fd7c1b5a925cf28eda769835e6f5d4cd
-
Size
58KB
-
MD5
01fd02e79acacbbb72be023af8f689b7
-
SHA1
557a78220a484aafb9342132d49c64cf6f28e4ce
-
SHA256
9dcb1599842fa07db1a4c49ce14278a7fd7c1b5a925cf28eda769835e6f5d4cd
-
SHA512
922656d9aea57ce951b1daff2a8b2fc7ef0941b401a2b684ebd980f1dd60db489d8c4de52169047eba0d0f5b4f53c41cc34b3984aef4f9323c23bf99ed6f9532
-
SSDEEP
1536:OA1sQk3hOdsylKlgxopeiBNhZFGzE+cL4LglnAhhL1oXm8a1nIn:Pk3hOdsylKlgxopeiBNhZFGzE+cL4LgD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9dcb1599842fa07db1a4c49ce14278a7fd7c1b5a925cf28eda769835e6f5d4cd.xls windows office2003