Behavioral task
behavioral1
Sample
20fd4e9fd31a6428fbfadbe67ce04b8db8996517ac5dba890edd252744dc7d6e.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20fd4e9fd31a6428fbfadbe67ce04b8db8996517ac5dba890edd252744dc7d6e.xls
Resource
win10v2004-20240802-en
General
-
Target
20fd4e9fd31a6428fbfadbe67ce04b8db8996517ac5dba890edd252744dc7d6e
-
Size
789KB
-
MD5
d9c8efda6f937cc47387d71d432d6a90
-
SHA1
94723d9b99376edabaa53933ce078fbaf60863d5
-
SHA256
20fd4e9fd31a6428fbfadbe67ce04b8db8996517ac5dba890edd252744dc7d6e
-
SHA512
1d7c5e9afdbf02bc19388f95cff7418fdecfea0ad8dff89ace255b698a0ed6b832d229c299082327408f1fef0a2d8c67ede79708c92d33a061e81c3dec040116
-
SSDEEP
12288:QgGeXq2+dP5m0Sq2SCBrEAW2ymDnwVxfiXXFG9dzW3:yx3P3RhCBZ0VxfW6lI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
20fd4e9fd31a6428fbfadbe67ce04b8db8996517ac5dba890edd252744dc7d6e.xls windows office2003
Sem
Page1
Module1
UserForm1
Module2
Module3
UserForm6
Page11
Module6
Module5