Behavioral task
behavioral1
Sample
3aafd49e8b45da7b71ac8e6223e86bdccb9f81f979312b66a0c6bf9b28034de1.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3aafd49e8b45da7b71ac8e6223e86bdccb9f81f979312b66a0c6bf9b28034de1.xls
Resource
win10v2004-20241007-en
General
-
Target
3aafd49e8b45da7b71ac8e6223e86bdccb9f81f979312b66a0c6bf9b28034de1.xls
-
Size
68KB
-
MD5
76cd88a1fcedb634ba92c2dbfe23f347
-
SHA1
c9d4637805cf01662d01468d9c7b4af6779f04e9
-
SHA256
3aafd49e8b45da7b71ac8e6223e86bdccb9f81f979312b66a0c6bf9b28034de1
-
SHA512
a0b81d373efd1844283718ca3999f7b34f5862a84043792660a31d13a1054033b0903d45becfe2a4c46ce1e847c84c6aef7ce32b91029abfac06bf5daf0975b3
-
SSDEEP
1536:LYxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAZXo4inBGp9tRG52yrrFL/+q:LYxEtjPOtioVjDGUU1qfDlaGGx+cL2Q3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3aafd49e8b45da7b71ac8e6223e86bdccb9f81f979312b66a0c6bf9b28034de1.xls.xls windows office2003
Module1
ThisWorkbook
Sheet1
Sheet2
Sheet3