Behavioral task
behavioral1
Sample
drawingsXandXspecification.xla.xls
Resource
win7-20220812-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
drawingsXandXspecification.xla.xls
Resource
win10v2004-20220812-en
18 signatures
150 seconds
General
-
Target
drawingsXandXspecification.xla.xlsx
-
Size
117KB
-
MD5
88996692facf9e3b7a3029bd5dd0b8f9
-
SHA1
a03ff5e6754d681ff5f36127bef77fa621a795ee
-
SHA256
026c54c38be34fc0438340416799d17dfa31c43ae0d4090177ca957661b80b58
-
SHA512
9678df35c36796182fa081fe37e4e770093aed55a93e30b01b4b41fec0a90eda35d8f80f4f4aeb4b0311654031bf3edcd79c1174c60d9acd051034d4d2b19a9a
-
SSDEEP
3072:NRk3hOdsylKlgxopeiBNhZFGzE+cL2kdA8BcrdxnNUHu8sRC5fBmglG:NRk3hOdsylKlgxopeiBNhZF+E+W2kdAj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
drawingsXandXspecification.xla.xlsx.xls .xlsx windows office2003