Behavioral task
behavioral1
Sample
7a5ac142c5dbe082b5a0eddd04a4143be8374df84060700d3d468f756254f9cf.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7a5ac142c5dbe082b5a0eddd04a4143be8374df84060700d3d468f756254f9cf.xls
Resource
win10v2004-20240802-en
General
-
Target
7a5ac142c5dbe082b5a0eddd04a4143be8374df84060700d3d468f756254f9cf
-
Size
382KB
-
MD5
a4f43afd9521291cb1fe5dbe647dbb6a
-
SHA1
ec8a5619213b40fca9deb3c2a211c29469eb25b4
-
SHA256
7a5ac142c5dbe082b5a0eddd04a4143be8374df84060700d3d468f756254f9cf
-
SHA512
8fa63230d3e3848251d73458ccf9445919358bef23f3d2e7f8c8c011565f63014fe23cca32a4a476fe051f69daa5d08b1780704df3e53ef333420429269a457f
-
SSDEEP
3072:USZeKWzzPKhhq5e68an4/+v5A4+6njjyW3fEuMJ:USZIfEuY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7a5ac142c5dbe082b5a0eddd04a4143be8374df84060700d3d468f756254f9cf.xls windows office2003