Behavioral task
behavioral1
Sample
1c85a73440d4f2fae812a9b5ff9c1e4597fe108792ec401353818385e3bcb9a2.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c85a73440d4f2fae812a9b5ff9c1e4597fe108792ec401353818385e3bcb9a2.xls
Resource
win10v2004-20240802-en
General
-
Target
1c85a73440d4f2fae812a9b5ff9c1e4597fe108792ec401353818385e3bcb9a2
-
Size
34KB
-
MD5
399d51f1aa700d6eafcd500cac695733
-
SHA1
5b71e240488334ac66e4e293f422c596e2da3b86
-
SHA256
1c85a73440d4f2fae812a9b5ff9c1e4597fe108792ec401353818385e3bcb9a2
-
SHA512
7faada4c2c7c081d9641d0b3a01f41a96ebe47a3938d05b30a2201771a6b475606400b85fd70bd62e3356cf8ed20d68d235d16f828c8789595a2ba2482c17a6e
-
SSDEEP
768:cNvT2WsyJIH1hkXxQKxyZxJgfaf856PDpp0N8s33wqAKvuiISo2BqN5i/WxCTacH:clIH1OxQKxy5gfaf8kDpp0N8s33wqAK3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1c85a73440d4f2fae812a9b5ff9c1e4597fe108792ec401353818385e3bcb9a2.xls windows office2003