Behavioral task
behavioral1
Sample
ae077a49b9c64042bfec4c08c90696191ebf0cde63b8a2fb8a470ebe73427ced.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae077a49b9c64042bfec4c08c90696191ebf0cde63b8a2fb8a470ebe73427ced.xls
Resource
win10v2004-20240802-en
General
-
Target
ae077a49b9c64042bfec4c08c90696191ebf0cde63b8a2fb8a470ebe73427ced.xls
-
Size
92KB
-
MD5
8da737e5f973809a7ae6ddc039777635
-
SHA1
5d11137d7ee9cd56f2b97732fb95f1c60290ddf6
-
SHA256
ae077a49b9c64042bfec4c08c90696191ebf0cde63b8a2fb8a470ebe73427ced
-
SHA512
e089b0e9cf4e05536713f22b33b54c2e92e73fd5bf6bfc87623b394bf1584170ab3065aaa3b0b31d826e0ab783d0ad110c8f7fb1223331a345c785c0d79bc457
-
SSDEEP
1536:QcKoSsxz1PDZL2Qiw+4868O8K/5Le1k3hOdsylKlgxopeiBNhZFGzE+cL2kdAlIj:QcKoSsxzNDZL2Qiw+4868O8K/5Le1k34
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ae077a49b9c64042bfec4c08c90696191ebf0cde63b8a2fb8a470ebe73427ced.xls.xls windows office2003