Behavioral task
behavioral1
Sample
8e9d6b417ea3ee16fcfb79a18585926f7667c3e800c26998b70c8bca07774d60.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8e9d6b417ea3ee16fcfb79a18585926f7667c3e800c26998b70c8bca07774d60.xls
Resource
win10v2004-20241007-en
General
-
Target
8e9d6b417ea3ee16fcfb79a18585926f7667c3e800c26998b70c8bca07774d60
-
Size
88KB
-
MD5
e499a61d7eccf4ca418cef1470b053da
-
SHA1
cd1bb9426abdd21729d81560642b8284918a469a
-
SHA256
8e9d6b417ea3ee16fcfb79a18585926f7667c3e800c26998b70c8bca07774d60
-
SHA512
746d00a46b219614d0cf55b746fe1aeae0dda3a6c538b3e8f6bb239a2612ddbc21bcbeab2ce19149f362dc3abbc8b70f946c9d4ab54ed43dde9eb86e39fe1cc1
-
SSDEEP
1536:2yehv7q2Pjx45uoDGTj+5xtekEvi8/dgL8EsAeE9jbDXQACkWvgrPE4nWHPNc2Ax:2yehv7q2Pjx45uoDGTj+5xtekEvi8/dG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8e9d6b417ea3ee16fcfb79a18585926f7667c3e800c26998b70c8bca07774d60.xls windows office2003
AdsGSryh6ifgbv
gjTiSdFHse4sdc
DFGrtHsr6uidfss
sd57e45yderfg