Behavioral task
behavioral1
Sample
b4f03f3ecca43b6423b9ac6b259d303adefdb7bbd74763b1baf0f8140c1b05b1.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f03f3ecca43b6423b9ac6b259d303adefdb7bbd74763b1baf0f8140c1b05b1.xls
Resource
win10v2004-20240802-en
General
-
Target
b4f03f3ecca43b6423b9ac6b259d303adefdb7bbd74763b1baf0f8140c1b05b1
-
Size
51KB
-
MD5
c7c97bb4dfda6ef2fa182c2f014efbd3
-
SHA1
97da608b4d2cfd110fb2607aceeec290b84ee2e2
-
SHA256
b4f03f3ecca43b6423b9ac6b259d303adefdb7bbd74763b1baf0f8140c1b05b1
-
SHA512
6507f1eb03de010df6a401158b6369161d59edc2e712862059af54f2846ab7e769a75b34a99eb9af33646e95992fda06103fdd30bc90e4b6862cc1489cd8bff5
-
SSDEEP
1536:Slk3hOdsylKlgryzc4bNhZFGzE+kD/gEAwh4o+Yj5aJViCydw+RpodTba:Slk3hOdsylKlgryzc4bNhZFGzE+kD/gy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b4f03f3ecca43b6423b9ac6b259d303adefdb7bbd74763b1baf0f8140c1b05b1.xls windows office2003