Behavioral task
behavioral1
Sample
d66d93f370e71baeb4eaeed10b233cb713063a201ea7a28125af3f8c66620cb0.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d66d93f370e71baeb4eaeed10b233cb713063a201ea7a28125af3f8c66620cb0.xls
Resource
win10v2004-20241007-en
General
-
Target
d66d93f370e71baeb4eaeed10b233cb713063a201ea7a28125af3f8c66620cb0
-
Size
88KB
-
MD5
bd13ab52926bf9538aa1b906a4b8b30a
-
SHA1
0ef77584239793a78c8cdb713a7dc11658a1153c
-
SHA256
d66d93f370e71baeb4eaeed10b233cb713063a201ea7a28125af3f8c66620cb0
-
SHA512
d02016df197791444d456261bcea858e23e73de8e231db9a6e2a3d13a72763fb6d2df6d965292bea0804180a0784b5ec322e3b28290248069a28f82a49283ce1
-
SSDEEP
1536:Jyehv7q2Pjx45uoDGTj+5xtekEvi8/dgL8EsAeE9jbDXQACkWvgrPE4nWHPNc2Ax:Jyehv7q2Pjx45uoDGTj+5xtekEvi8/dG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
d66d93f370e71baeb4eaeed10b233cb713063a201ea7a28125af3f8c66620cb0.xls windows office2003
AdsGSryh6ifgbv
gjTiSdFHse4sdc
DFGrtHsr6uidfss
sd57e45yderfg