Behavioral task
behavioral1
Sample
a132b30c68203e039fd1137cd34b69aab0c5dc65bdb18199fc274f1913c46907.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a132b30c68203e039fd1137cd34b69aab0c5dc65bdb18199fc274f1913c46907.xls
Resource
win10v2004-20240802-en
General
-
Target
a132b30c68203e039fd1137cd34b69aab0c5dc65bdb18199fc274f1913c46907
-
Size
42KB
-
MD5
d064561f5c13dffa186625456c264e15
-
SHA1
f4c1bc37bf10f7649bed0e13cedfce708a92aaca
-
SHA256
a132b30c68203e039fd1137cd34b69aab0c5dc65bdb18199fc274f1913c46907
-
SHA512
a2b63a6eeef6718e63c9ac8204d134c9ea054ec36c8e1a3444c50eb94afd8746dcd2022937be15a3bccf5d0f758320dcd651ae6c82a022529a6dbaa9c3e4db39
-
SSDEEP
768:PcQjEDYBge8rmjPOtyoVjDGL61EfDlaGGx+kD/IEzuBVSlsgEobeId2MBE52S:LwDYBR8rmjPOtyoVjDGL61EfDlaGGx+R
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a132b30c68203e039fd1137cd34b69aab0c5dc65bdb18199fc274f1913c46907.xls windows office2003