Behavioral task
behavioral1
Sample
9e5ceb64b9d345f5206e6cbe74763cc7725b4778fe504ef3f2559a196aa4e6ae.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e5ceb64b9d345f5206e6cbe74763cc7725b4778fe504ef3f2559a196aa4e6ae.xls
Resource
win10v2004-20240802-en
General
-
Target
9e5ceb64b9d345f5206e6cbe74763cc7725b4778fe504ef3f2559a196aa4e6ae
-
Size
42KB
-
MD5
b1165c2b6a90726c7929ecfc25aa08c9
-
SHA1
23efede15a992e69b76341bae1a64e0aa7a1685e
-
SHA256
9e5ceb64b9d345f5206e6cbe74763cc7725b4778fe504ef3f2559a196aa4e6ae
-
SHA512
b75e0afec7f524c6f34df2190e7fc49a4c283793e0de0dc4b24ab9eb49d7033610d12fd401f57237fd7527dbb96ecd111a13bca3687ef7f3589550702575b856
-
SSDEEP
768:VcQjEDYBge8rmjPOtyoVjDGL61EfDlaGGx+kD/IEzuBVSlsgEobeId2MBE52S:ZwDYBR8rmjPOtyoVjDGL61EfDlaGGx+R
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9e5ceb64b9d345f5206e6cbe74763cc7725b4778fe504ef3f2559a196aa4e6ae.xls windows office2003