Behavioral task
behavioral1
Sample
8f05f0a7e40007739aa9f00b857a833b68f7439592da3054bf4e250599d61f4c.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f05f0a7e40007739aa9f00b857a833b68f7439592da3054bf4e250599d61f4c.xls
Resource
win10v2004-20240802-en
General
-
Target
8f05f0a7e40007739aa9f00b857a833b68f7439592da3054bf4e250599d61f4c
-
Size
184KB
-
MD5
27d95faaf369f4cdad5dda46ccf7af5a
-
SHA1
8893770451d085d8d2fe2275904e546fbe182c54
-
SHA256
8f05f0a7e40007739aa9f00b857a833b68f7439592da3054bf4e250599d61f4c
-
SHA512
30516c9f60035de56928c01ea99ce06667a76381bf3d8bcfdca47f14b3547b74c01b5465de4b046e794baf3c9c0530624be0dc6404ed8f503fb093f2f49a7e21
-
SSDEEP
3072:6RCd3AxosdMvT63mxMnkxHWmsuM1zpRh+BUGf2XIEAYhIXBI9g3+4Zbjc0wUdC+q:6RCd3AxosdMvT63mxMnkxHWmsuMZpRoN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8f05f0a7e40007739aa9f00b857a833b68f7439592da3054bf4e250599d61f4c.xls windows office2003