Behavioral task
behavioral1
Sample
bad.xls
Resource
win7-20220812-en
8 signatures
150 seconds
General
-
Target
bad.xls
-
Size
119KB
-
MD5
0799340d7cc28d4d8042a925a578c495
-
SHA1
a05ce2afecb108a8176bac22d0a7ef41c108a538
-
SHA256
99b7bac477eb032a24e893d9c9ef0794de0f9f482cf5ec727403a3cccffcaf6c
-
SHA512
16ab28d8772f88a01fc3ce3639d966f4f59f0905a2c726b1d6ad51ec48859f4ae52a48781743637870c2ec011145ead4110419460fb73505d17d9922cfcc6576
-
SSDEEP
3072:9k3hOdsylKlgxopeiBNhZFGzE+cL2kdA5zxqwa+43nMqSm99s7zsPX:9k3hOdsylKlgxopeiBNhZF+E+W2kdAaQ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bad.xls.xls .js windows office2003