Behavioral task
behavioral1
Sample
edff33728be32021df39e1a47cf7f6312ad1e8bfe8bea7622321d864cc59e912.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
edff33728be32021df39e1a47cf7f6312ad1e8bfe8bea7622321d864cc59e912.xls
Resource
win10v2004-20241007-en
General
-
Target
edff33728be32021df39e1a47cf7f6312ad1e8bfe8bea7622321d864cc59e912
-
Size
46KB
-
MD5
599429737e8714d5c491225a35a0366e
-
SHA1
7049ab521a9043b08b8a5a5015cf281af12d2b41
-
SHA256
edff33728be32021df39e1a47cf7f6312ad1e8bfe8bea7622321d864cc59e912
-
SHA512
7336335c258b0b1c1dd7d80c978f399e726678288993ed5035f5a3447c4379ef24dda0c6689c6de133d4f23fd9bce6f485ac5d9ac270ad4000dff8d89894dae5
-
SSDEEP
768:n4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:4SFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
edff33728be32021df39e1a47cf7f6312ad1e8bfe8bea7622321d864cc59e912.xls windows office2003