Behavioral task
behavioral1
Sample
a31a7dcb0c81f95639707355d4cd6a03119b83dbbfa3c13ab648f322106b9adb.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a31a7dcb0c81f95639707355d4cd6a03119b83dbbfa3c13ab648f322106b9adb.xls
Resource
win10v2004-20241007-en
General
-
Target
a31a7dcb0c81f95639707355d4cd6a03119b83dbbfa3c13ab648f322106b9adb
-
Size
927KB
-
MD5
4694c2695589b7275a827fbbb2de4308
-
SHA1
d85868e6fa9bace9b49918b139ee2ddf175b511d
-
SHA256
a31a7dcb0c81f95639707355d4cd6a03119b83dbbfa3c13ab648f322106b9adb
-
SHA512
1b05424462c5a401c199f2855e0c9ca6a74ae2dc71ec010c35f128c26ff562fa461331b4db54ed1ef81c19d2e864c9fe0b99a22d8fe5d11280b45792a72e3f04
-
SSDEEP
12288:I7vmwAeTeZJlQlRmtwh7HvtDyNzE0AncNcNEp:3eTe2lRmtwRcw0AcNcNS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a31a7dcb0c81f95639707355d4cd6a03119b83dbbfa3c13ab648f322106b9adb.xls windows office2003