Behavioral task
behavioral1
Sample
204609f4a55dcf5859ba8b047e453b82e93f4c32028a3484c91731a49d1c6d6a.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
204609f4a55dcf5859ba8b047e453b82e93f4c32028a3484c91731a49d1c6d6a.xls
Resource
win10v2004-20240802-en
General
-
Target
204609f4a55dcf5859ba8b047e453b82e93f4c32028a3484c91731a49d1c6d6a
-
Size
189KB
-
MD5
e077c448ab7de107f0cabe13899dfe17
-
SHA1
49ae1d009372fcedfdbe2e880cc31e457b919ad4
-
SHA256
204609f4a55dcf5859ba8b047e453b82e93f4c32028a3484c91731a49d1c6d6a
-
SHA512
f9a0edc2e319d48eb71454baa5f12c74ebd596e6f203933735ee9aa47f8849539586a75846423beb437e92b7f973576e1a08d939f0360695bcac919f01b80cf4
-
SSDEEP
3072:cJe6O9qbVNcry/4c5tmDV0nk3hOdsylKlgxopeiBNhZFGzE+cL4LglnA+3oyEKVT:4e6O9GVNcry/btmDV4k3hOdsylKlgxof
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
204609f4a55dcf5859ba8b047e453b82e93f4c32028a3484c91731a49d1c6d6a.xls windows office2003