Behavioral task
behavioral1
Sample
e96157b087433e6229b73c34378b78a424e212f8aa17b636e061bbb510160dde.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e96157b087433e6229b73c34378b78a424e212f8aa17b636e061bbb510160dde.xls
Resource
win10v2004-20241007-en
General
-
Target
e96157b087433e6229b73c34378b78a424e212f8aa17b636e061bbb510160dde
-
Size
438KB
-
MD5
24566eb11518c1097b4f73f5df0f6ade
-
SHA1
a0259d07a45d3c3dc41a3035f8a2c708a0ec9218
-
SHA256
e96157b087433e6229b73c34378b78a424e212f8aa17b636e061bbb510160dde
-
SHA512
49d8c76c6fe0a8bb3d8e3e4f88460df7fbc6e1f7978c23152ec3dfe46fe32fb44e8eabf2cd6c6292711afbcd7ef1454a1be10ce8ca121c8bcda4b20dea507e21
-
SSDEEP
12288:J947a/JjsLZjXYc7X0/aXCKli04OaZ1XyAzhFA:ZurYc7E/i004OS7zhFA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
e96157b087433e6229b73c34378b78a424e212f8aa17b636e061bbb510160dde.xls windows office2003
DFdgfhdSG68ur
zasD346tjldff
jSgbhisudhfozis