Behavioral task
behavioral1
Sample
34e4e229f943419014e699ab59ae5d4bf7b3a99f499ab8ab750bb8cf3a8118f1.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34e4e229f943419014e699ab59ae5d4bf7b3a99f499ab8ab750bb8cf3a8118f1.xls
Resource
win10v2004-20241007-en
General
-
Target
34e4e229f943419014e699ab59ae5d4bf7b3a99f499ab8ab750bb8cf3a8118f1
-
Size
46KB
-
MD5
d26eae53bd39b5faea126221160286df
-
SHA1
9b8fcba864831924ab5fcb1c0a7d9d7c0fd2b7d4
-
SHA256
34e4e229f943419014e699ab59ae5d4bf7b3a99f499ab8ab750bb8cf3a8118f1
-
SHA512
2efd25b6041942de6e044dbb8ad53418277178abf91a65664cd2bc384f54724951d16b4ceab6e47f80751fc84467a86e6e1d007252a3508ad9ac7bcaccdbb001
-
SSDEEP
768:r4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:8SFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
34e4e229f943419014e699ab59ae5d4bf7b3a99f499ab8ab750bb8cf3a8118f1.xls windows office2003