Behavioral task
behavioral1
Sample
ac7102e7ac7113f398c0083922c7cc3af1344bfd6a8709e1cc4003923490ac1b.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac7102e7ac7113f398c0083922c7cc3af1344bfd6a8709e1cc4003923490ac1b.xls
Resource
win10v2004-20241007-en
General
-
Target
ac7102e7ac7113f398c0083922c7cc3af1344bfd6a8709e1cc4003923490ac1b
-
Size
718KB
-
MD5
cb09ff9aa21c571f6551c3353c7f796c
-
SHA1
67c303002393b569a88bb055cb2ca12abf8f86d1
-
SHA256
ac7102e7ac7113f398c0083922c7cc3af1344bfd6a8709e1cc4003923490ac1b
-
SHA512
202afcbb2a8d706f1cd626e95c29195eaaac5cbe7dfbe18764cfbd557596128487a7cb53f3eb1f08cfee2b3bd13a28b882299aed3a2150aa4a4f12a936f78358
-
SSDEEP
6144:+IH1OxQKxy5gfaf8kDfs3wCmm4tebTJ3TXEeZ/MP+3INtIt:/PMoK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ac7102e7ac7113f398c0083922c7cc3af1344bfd6a8709e1cc4003923490ac1b.xls windows office2003