Behavioral task
behavioral1
Sample
5d58e758e728ee4df1f238864186431de63a8b38508c427f53abd07c8c9fb95f.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5d58e758e728ee4df1f238864186431de63a8b38508c427f53abd07c8c9fb95f.xls
Resource
win10v2004-20241007-en
General
-
Target
5d58e758e728ee4df1f238864186431de63a8b38508c427f53abd07c8c9fb95f
-
Size
46KB
-
MD5
434d89ccf58222a7a8677f194a7eec0a
-
SHA1
fe29a64739dea4e8bf40fa0a5e02e88bed417c32
-
SHA256
5d58e758e728ee4df1f238864186431de63a8b38508c427f53abd07c8c9fb95f
-
SHA512
2386756bf990e6b3b72baad089d87078fb3a837b0f1e1a1d4be4be582749eb8d2b74e8ba416aeed58dc6c3d2cf6436f9c9ac082ded470165f3601b81b9546cbe
-
SSDEEP
768:d4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:qSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
5d58e758e728ee4df1f238864186431de63a8b38508c427f53abd07c8c9fb95f.xls windows office2003