Behavioral task
behavioral1
Sample
e0ea4752bd671d195f53c4699aa6a2e169c2026a73f153f9bcad66cb59355160.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0ea4752bd671d195f53c4699aa6a2e169c2026a73f153f9bcad66cb59355160.xls
Resource
win10v2004-20241007-en
General
-
Target
e0ea4752bd671d195f53c4699aa6a2e169c2026a73f153f9bcad66cb59355160
-
Size
46KB
-
MD5
4cb9e433653daf1ac21b6852e6fa6fd6
-
SHA1
0a98f758d62251129c9ac997fe3d7c43cdccd3d6
-
SHA256
e0ea4752bd671d195f53c4699aa6a2e169c2026a73f153f9bcad66cb59355160
-
SHA512
1bb0ffb07d750ce1f6720b05e67b9a06d8dd7fa7274afee511cc7983778a11493a39621585bf9c174e89e6e45eaf34961ce5aa129da82fc082d3dcbb744acb6c
-
SSDEEP
768:I4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:DSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
e0ea4752bd671d195f53c4699aa6a2e169c2026a73f153f9bcad66cb59355160.xls windows office2003