Behavioral task
behavioral1
Sample
89066c042f5b5fcc6c2d08794ef75aa6f2a6cf1deaefc100fbd8c0c2b4fd4383.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89066c042f5b5fcc6c2d08794ef75aa6f2a6cf1deaefc100fbd8c0c2b4fd4383.xls
Resource
win10v2004-20240802-en
General
-
Target
89066c042f5b5fcc6c2d08794ef75aa6f2a6cf1deaefc100fbd8c0c2b4fd4383
-
Size
76KB
-
MD5
4e6234d09df96cb998416771272dfe2d
-
SHA1
7a30611e7a048d43580c6578b4c3ded522a69d44
-
SHA256
89066c042f5b5fcc6c2d08794ef75aa6f2a6cf1deaefc100fbd8c0c2b4fd4383
-
SHA512
6d8696d84477186ef928f41944b0dbb0ceb1779c7b9de811ff8b7de3ae2b6e9539b411acbf895047e285f54a87218ee112aec75586e59a3ca1e295760c46000a
-
SSDEEP
1536:gzxEtjPOtioVjDGUU1qfDlaGGx+cWgLI0dAk6s+eqlqn85L:gzxEtjPOtioVjDGUU1qfDlaGGx+cWgLB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
89066c042f5b5fcc6c2d08794ef75aa6f2a6cf1deaefc100fbd8c0c2b4fd4383.xls windows office2003