Behavioral task
behavioral1
Sample
1b492296522768350c056d852e9a728bdcd8e13a3158e2a4153a3015395c2594.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1b492296522768350c056d852e9a728bdcd8e13a3158e2a4153a3015395c2594.xls
Resource
win10v2004-20241007-en
General
-
Target
1b492296522768350c056d852e9a728bdcd8e13a3158e2a4153a3015395c2594
-
Size
46KB
-
MD5
a3d7a510ea532c4891ea21a29e0c66bb
-
SHA1
c5dbf470aec1f29ed239cc7aa1c471ab343909ca
-
SHA256
1b492296522768350c056d852e9a728bdcd8e13a3158e2a4153a3015395c2594
-
SHA512
52383dc88ad45dd62c8b77d38fafe78e1f7377efc939632106b1c043505572ecc78fd5b06f8172ce68dbd09961c05342329b71016aa703fb2b8d5b428cd1e5f9
-
SSDEEP
768:v4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:wSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
1b492296522768350c056d852e9a728bdcd8e13a3158e2a4153a3015395c2594.xls windows office2003