Behavioral task
behavioral1
Sample
aa4b6d2aaa62484e99a348b7f120ede909eb96de31dfa17c01a910a653f04707.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aa4b6d2aaa62484e99a348b7f120ede909eb96de31dfa17c01a910a653f04707.xls
Resource
win10v2004-20240802-en
General
-
Target
aa4b6d2aaa62484e99a348b7f120ede909eb96de31dfa17c01a910a653f04707
-
Size
33KB
-
MD5
3cbe46fa70809083602e4be4530681c7
-
SHA1
4617f501086963b9ccdfed5c286c84e4d1832d4d
-
SHA256
aa4b6d2aaa62484e99a348b7f120ede909eb96de31dfa17c01a910a653f04707
-
SHA512
befa5f57bddee87e41ebcdef29d74e0e9429069760b55b61159dc2f90658ebf1463c7e19daceebaa09c3b7cdf8507362b6d5a74da5e002666ab24efd6c95557e
-
SSDEEP
768:ecfpHk3hbdlylKsgqopeJBWhZFGkE+cL/xGRxsjZveYWB4MIbhEB47O7n25Q:Xxk3hbdlylKsgqopeJBWhZFGkE+cL/xI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
aa4b6d2aaa62484e99a348b7f120ede909eb96de31dfa17c01a910a653f04707.xls windows office2003