Behavioral task
behavioral1
Sample
07b8864801ff2a96519e2570bd28ed7bbdf1b69f8aee7ab94508fe5516c90173.xls
Resource
win7-20220715-en
11 signatures
150 seconds
General
-
Target
07b8864801ff2a96519e2570bd28ed7bbdf1b69f8aee7ab94508fe5516c90173
-
Size
698KB
-
MD5
7bb9e45da9ee4883ba56fc9b8f886259
-
SHA1
f2fa0eab12634b9d09a705b6081878de2db70730
-
SHA256
07b8864801ff2a96519e2570bd28ed7bbdf1b69f8aee7ab94508fe5516c90173
-
SHA512
912bbab3eec388226d67d5bc241ea2f5b778a99f14f859e511f9449838ea2eb3bf66ad6a7c11e555dcf1ad6d368cb1f3acdb9c98994467edf5030ac3f539e84a
-
SSDEEP
12288:EEX3EPBqRuI3VdiSFK+8dvGNF9tvkYEFKsX7d+kQCi6kGED4VK/we3xqte:l3CalR/OGN1kYEFF1QsWD4VTekw
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
07b8864801ff2a96519e2570bd28ed7bbdf1b69f8aee7ab94508fe5516c90173.xls windows office2003
Sem
Page1
Module1
UserForm1
Module2
Module3
UserForm2
Page11