Behavioral task
behavioral1
Sample
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls
Resource
win10v2004-20240802-en
General
-
Target
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce
-
Size
184KB
-
MD5
9431258606d6ffc1222205f20890f263
-
SHA1
e09bf0335be302fb5761d383f940fb512339f7b3
-
SHA256
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce
-
SHA512
c307d747d0fae105abe79dcf30b5495510c181abc6584cd655a6054c58aea3e14b46499cff8ca547e061241a3fa2203daa4075f81607f5ba5bc7a25339c18964
-
SSDEEP
3072:6RCd3AxosdMvT63mxMnkxHWmsuM1zpRh+BUGf2XIEAYhIXBI9g3+4Zbjc0wUdC+q:6RCd3AxosdMvT63mxMnkxHWmsuMZpRoN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls windows office2003