Behavioral task
behavioral1
Sample
82156ffacf3b1e35c51a0d8ae639e291253e4c94931b75a53995c1aaa65b112f.xls
Resource
win10-20220812-en
4 signatures
150 seconds
General
-
Target
82156ffacf3b1e35c51a0d8ae639e291253e4c94931b75a53995c1aaa65b112f
-
Size
209KB
-
MD5
e445452410d2ae8096570e58e4fe67b3
-
SHA1
2ffcabb5f1f7bb025a577251ac3aac35eace79fd
-
SHA256
82156ffacf3b1e35c51a0d8ae639e291253e4c94931b75a53995c1aaa65b112f
-
SHA512
375c216615d192bed32002578ed3bcb559e4315a7fbd32df970b989b5c66db0d9babafb396f1ad9a4525e064dd1c584de5fece4cb94592b9682cf83d8bfc5d4c
-
SSDEEP
6144:YqnosqgIEYy6oto9/sr1EMApJ8xAQJQFXna068TtHmz:u68TtHm
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
82156ffacf3b1e35c51a0d8ae639e291253e4c94931b75a53995c1aaa65b112f.xls windows office2003
DieseArbeitsmappe
Tabelle1
Tabelle2
Tabelle3
Tabelle4
Tabelle5
Tabelle6
Tabelle7
Kangatang