Behavioral task
behavioral1
Sample
077782b6f094679f07c7d75532c4ade80b393aaecc21a9e99ce9db2a2a2363da.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
077782b6f094679f07c7d75532c4ade80b393aaecc21a9e99ce9db2a2a2363da.xls
Resource
win10v2004-20241007-en
General
-
Target
077782b6f094679f07c7d75532c4ade80b393aaecc21a9e99ce9db2a2a2363da
-
Size
138KB
-
MD5
240e23646f7eea10d96c6d094abae48a
-
SHA1
8f163824581c9e8eca26aa43708816b1db7b0c3b
-
SHA256
077782b6f094679f07c7d75532c4ade80b393aaecc21a9e99ce9db2a2a2363da
-
SHA512
aace2d47cba74b058506cad53fe38cef310bed91c24e98f8581b07101c73af452a07b2499b595135f855e899af6e0604b2e8a4efcf88b526f73dbb05305443ae
-
SSDEEP
3072:uKehv7q2Pjx45uoDGTj+5xtekEvi8/dgwa3Wm47CdX5gVvhoxzYLasdJXIchFL:lehv7q2Pjx45uoDGTj+5xtFEvi8/dgwh
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
077782b6f094679f07c7d75532c4ade80b393aaecc21a9e99ce9db2a2a2363da.xls windows office2003
GsreG4hts9id8
rs5udfdreh
serh3wdrttTS4
hDStysh4oeed