Behavioral task
behavioral1
Sample
0334bf5b2e508297bfd46641411b7a887763773d8130c15f4e35dbb8c5f6a82e.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0334bf5b2e508297bfd46641411b7a887763773d8130c15f4e35dbb8c5f6a82e.xls
Resource
win10v2004-20241007-en
General
-
Target
0334bf5b2e508297bfd46641411b7a887763773d8130c15f4e35dbb8c5f6a82e
-
Size
29KB
-
MD5
fc8a02760d9a106343b827ecd30713ec
-
SHA1
4a1addc451fc45be66398f73236db3af6e88fe78
-
SHA256
0334bf5b2e508297bfd46641411b7a887763773d8130c15f4e35dbb8c5f6a82e
-
SHA512
ca3863e71e26f8bc971676dc0e81ea5d88a1e8b9da6ead198806b658a70a86485994f9515c67f27dd3226bd3d376aaca8867187c0a5340ffd1ce93e8d6b95b22
-
SSDEEP
768:ibvyfw69ysylKlgeDaJVqNhZFGzE+cugLJ0dAxEQx6qlCguU:Bfw69ysylKlgeDaJVqNhZFGzE+cugLJ9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0334bf5b2e508297bfd46641411b7a887763773d8130c15f4e35dbb8c5f6a82e.xls windows office2003