Behavioral task
behavioral1
Sample
35cdf01f357d5cc70735fc5c0e1dda448d4ba79786e9cba60f31b97139953727.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
35cdf01f357d5cc70735fc5c0e1dda448d4ba79786e9cba60f31b97139953727.xls
Resource
win10v2004-20241007-en
General
-
Target
35cdf01f357d5cc70735fc5c0e1dda448d4ba79786e9cba60f31b97139953727
-
Size
46KB
-
MD5
4360b82910d2577e2fbb3f10e423395c
-
SHA1
9d3d039e74400e7ea02bf359af9ba31fe36cec8e
-
SHA256
35cdf01f357d5cc70735fc5c0e1dda448d4ba79786e9cba60f31b97139953727
-
SHA512
7c971060c5a40a961ea6c742f17afc879d82ca828f1beb886aeb8e1dddcf6a3a9e12a799b26e99c42b65f2d3808b781b6eb4d101315cee2cb807ecc68b9a3de9
-
SSDEEP
768:3X4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9UF:YSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
35cdf01f357d5cc70735fc5c0e1dda448d4ba79786e9cba60f31b97139953727.xls windows office2003