Behavioral task
behavioral1
Sample
ca2903b4a6423eccf466a1ab5ba83efc81c0e1ac76741eb2c6432e8e6efff64c.xls
Resource
win7-20220715-en
7 signatures
150 seconds
General
-
Target
ca2903b4a6423eccf466a1ab5ba83efc81c0e1ac76741eb2c6432e8e6efff64c
-
Size
729KB
-
MD5
5fd6c9ca842ef4fd97dc05d666b8d2a9
-
SHA1
89be226ee9c2d0997ed4147e9c0c22f9fe1e5d88
-
SHA256
ca2903b4a6423eccf466a1ab5ba83efc81c0e1ac76741eb2c6432e8e6efff64c
-
SHA512
1f656a4ad976fdb80c1f645529471f867d1f6a931b9d3d3a99ed2c8eb085abc9f5b345dcdcb0c1a0dfec9eadf8272d32e20a250bae6f36dd56bfdca4e27947f0
-
SSDEEP
12288:TEX3EPBqRuI3VdiSFK+8dvGNF9tvkYEFKsX7d+DQCi6kGED4VK/wewmVC2xqUe:23CalR/OGN1kYEFFqQsWD4VTewUCxv
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ca2903b4a6423eccf466a1ab5ba83efc81c0e1ac76741eb2c6432e8e6efff64c.xls windows office2003
Sem
Page1
Module1
UserForm1
Module2
Module3
UserForm2
Page11