Behavioral task
behavioral1
Sample
c0c6fd29fb0e19068878eceea6dac88812454f226d96f9244851bfd0df89e77c.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0c6fd29fb0e19068878eceea6dac88812454f226d96f9244851bfd0df89e77c.xls
Resource
win10v2004-20241007-en
General
-
Target
c0c6fd29fb0e19068878eceea6dac88812454f226d96f9244851bfd0df89e77c
-
Size
46KB
-
MD5
d5f5adcafdae062e965870ced9756be7
-
SHA1
7cc30262d810e3bfb1c939a5790ec15fb4ff905d
-
SHA256
c0c6fd29fb0e19068878eceea6dac88812454f226d96f9244851bfd0df89e77c
-
SHA512
9fdeddc8c8edad7290e77b5a2ec8182641ae7ddb015f5d25ef6d25eb8dc84e148a276404d4387c38cf13482caa3fc5a9258904274dd40cd53c056628743c3b2e
-
SSDEEP
768:c4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:HSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
c0c6fd29fb0e19068878eceea6dac88812454f226d96f9244851bfd0df89e77c.xls windows office2003