Behavioral task
behavioral1
Sample
8f572f31410e7c82ffc210a73ac0f5d484141a425c0f0545485437a4351da180.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8f572f31410e7c82ffc210a73ac0f5d484141a425c0f0545485437a4351da180.xls
Resource
win10v2004-20241007-en
General
-
Target
8f572f31410e7c82ffc210a73ac0f5d484141a425c0f0545485437a4351da180
-
Size
155KB
-
MD5
d3e6a5d4a41388fe0b59863727aff764
-
SHA1
b8be75122d4267d39296087188e1f260a6541fb3
-
SHA256
8f572f31410e7c82ffc210a73ac0f5d484141a425c0f0545485437a4351da180
-
SHA512
be02770c42c00058a18a6e7fd3ab6565cadc040f7a042f1f532e4fc552c0fee6618238cff3bee1b771bec7a4cb93b8199153a5a661c16403adc2d75c5ed1b5bf
-
SSDEEP
3072:dIcKoSsxzNDZLDZjlbR868O8K3A4XQxEtjPOtioVjDGUU1qfDlaGGx+cLYIxA1Gf:icKoSsxzNDZLDZjlbR868O8K3A4XQxER
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8f572f31410e7c82ffc210a73ac0f5d484141a425c0f0545485437a4351da180.xls windows office2003
go4ihosidlsHDasd
GFe7dryFhsdrgg
UserForm1
MNfygIyki6FGDiyd
bvkeirugtiugsdkjs