Behavioral task
behavioral1
Sample
ca3681cfbba87b89ded304dbfd4609a8b1ae7fa42d0afff3956012aa26cc3aff.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ca3681cfbba87b89ded304dbfd4609a8b1ae7fa42d0afff3956012aa26cc3aff.xls
Resource
win10v2004-20240802-en
General
-
Target
ca3681cfbba87b89ded304dbfd4609a8b1ae7fa42d0afff3956012aa26cc3aff
-
Size
67KB
-
MD5
c91135660a093d1a042fa0e991f51be8
-
SHA1
f3b5668136b5c34dd5a4b3e4be0fe4194247dc0c
-
SHA256
ca3681cfbba87b89ded304dbfd4609a8b1ae7fa42d0afff3956012aa26cc3aff
-
SHA512
e785bf3f59ca247c521857973a3a3a77cf4d3c3bb7a33a49710080c4d8f7e94af32862d8927cb8345e6f8917b4fb5949ff8641a414f047c749cf4d2d613a22da
-
SSDEEP
1536:jpOkxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdXYBkmdV5mKT15sWmMKa1:jp7xEtjPOtioVjDGUU1qfDlaGGx+cL+t
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ca3681cfbba87b89ded304dbfd4609a8b1ae7fa42d0afff3956012aa26cc3aff.xls windows office2003
Kangatang