Behavioral task
behavioral1
Sample
1d3ea7e6012e41fb26cf3775aba9444ec03448e8f60b88e0f5e6a4c3262ce092.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d3ea7e6012e41fb26cf3775aba9444ec03448e8f60b88e0f5e6a4c3262ce092.xls
Resource
win10v2004-20240910-en
General
-
Target
1d3ea7e6012e41fb26cf3775aba9444ec03448e8f60b88e0f5e6a4c3262ce092
-
Size
69KB
-
MD5
1830a597a64336d2af220aee2d32585e
-
SHA1
2c4f64750e4864ca2fbbc3f813bcaba5cbb4ed33
-
SHA256
1d3ea7e6012e41fb26cf3775aba9444ec03448e8f60b88e0f5e6a4c3262ce092
-
SHA512
af3b8ff1e4ba91341b5df55d09e309487b4718032b956b3e32564288afd053d824899aba33846b440bd4330263f0742a1c5b945069939bbd44179b11767b59ef
-
SSDEEP
1536:3lL8rmjPOtyoVjDGL61EfDlaGGx+cLYIxnSPiYhuLzQASURJLFAhf8tWd2m8i:3R8rmjPOtyoVjDGL61EfDlaGGx+cLYIq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1d3ea7e6012e41fb26cf3775aba9444ec03448e8f60b88e0f5e6a4c3262ce092.xls windows office2003