Behavioral task
behavioral1
Sample
f5f024a4584870f53bbbe5071aaa038b6cbc6d53c43e74c861e2a6b4ef769ffe.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5f024a4584870f53bbbe5071aaa038b6cbc6d53c43e74c861e2a6b4ef769ffe.xls
Resource
win10v2004-20241007-en
General
-
Target
f5f024a4584870f53bbbe5071aaa038b6cbc6d53c43e74c861e2a6b4ef769ffe
-
Size
88KB
-
MD5
aeb067aa4469ab8451f4c31d84972d4c
-
SHA1
3eb12a9a92320e51288a29dc75b369ad1635b443
-
SHA256
f5f024a4584870f53bbbe5071aaa038b6cbc6d53c43e74c861e2a6b4ef769ffe
-
SHA512
b3f3d4719583c0cdb57d2ed1e0f44753ac56283580f917fb3aa7b67acb743c88e38f0fd5fc7bde9cb187cd3f4046d1de30b235552389a17d35877fd7a29c6442
-
SSDEEP
1536:Iyehv7q2Pjx45uoDGTj+5xtekEvi8/dg38EsAeE9jbDXQfJkWvgrPE4nWHPNc2Al:Iyehv7q2Pjx45uoDGTj+5xtekEvi8/dk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
f5f024a4584870f53bbbe5071aaa038b6cbc6d53c43e74c861e2a6b4ef769ffe.xls windows office2003
AdsGSryh6ifgbv
gjTiSdFHse4sdc
DFGrtHsr6uidfss
sd57e45yderfg