Behavioral task
behavioral1
Sample
14163a1b9ca64948342d1d8558d21e650d9e5236a4d5a3aefe4476ca2c24477e.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14163a1b9ca64948342d1d8558d21e650d9e5236a4d5a3aefe4476ca2c24477e.xls
Resource
win10v2004-20241007-en
General
-
Target
14163a1b9ca64948342d1d8558d21e650d9e5236a4d5a3aefe4476ca2c24477e
-
Size
39KB
-
MD5
01c53a0cfc7e1fe0f9e6de9bc4ea15b5
-
SHA1
b638272db1ec605b1917609a5f384c01970bf63f
-
SHA256
14163a1b9ca64948342d1d8558d21e650d9e5236a4d5a3aefe4476ca2c24477e
-
SHA512
bc74cef385e30c83891bc3e6267e2328467631d264a7db1b2f32e7296612f29215f73661d95b4b7294030b1999b0e9c936e2e0870300c1fe4ada3bdb0f669669
-
SSDEEP
768:GKjMSWnk3hbdlylKsgqopeJBWhZFGkE+cLWx9AZ8cNAoG+MY5LbpnzoAMTpMF+:ngk3hbdlylKsgqopeJBWhZFGkE+cLWxB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
14163a1b9ca64948342d1d8558d21e650d9e5236a4d5a3aefe4476ca2c24477e.xls windows office2003