Behavioral task
behavioral1
Sample
2d593d80c97bf04124422068c8bcd91070750bd7792eb39926790fbc229589db.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d593d80c97bf04124422068c8bcd91070750bd7792eb39926790fbc229589db.xls
Resource
win10v2004-20241007-en
General
-
Target
2d593d80c97bf04124422068c8bcd91070750bd7792eb39926790fbc229589db
-
Size
46KB
-
MD5
836c57d347726357d1e67ec4fee4960c
-
SHA1
79b73aa267a84dcf5fe8cb9b7aad481428f4f5fe
-
SHA256
2d593d80c97bf04124422068c8bcd91070750bd7792eb39926790fbc229589db
-
SHA512
edb98a134333a83be3ed49367ad2ea4e5d31c419e5b45840ffa2b804b9c7f2dfd9712ea98fd83831b253b6363f92f77fda7a740bff3aea3d68d1ddb01968b2ef
-
SSDEEP
768:H4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:YSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
2d593d80c97bf04124422068c8bcd91070750bd7792eb39926790fbc229589db.xls windows office2003