Behavioral task
behavioral1
Sample
SecuriteInfo.com.Script.SNH-gen.9465.5598.xls
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Script.SNH-gen.9465.5598.xls
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Script.SNH-gen.9465.5598.xls
-
Size
571KB
-
MD5
f12ff8c249bb5fa66bf7456dbd24d2f4
-
SHA1
a95cb2684dc78798816008833da88f9e09031690
-
SHA256
d89593a50b26663b82f9720ffaa24ba6c91216266c582333e469f9c48f6e2199
-
SHA512
a3f17f4d82c520eca83f4c3f4c243e89d7eabf456fb1a653e60ec4d97b1ed87ff9117ba81ed0ad3f277a72da8142c46733663675f887ee86846e3f5e62e093ec
-
SSDEEP
6144:1aR1CEqhx4eKc5bOSXAmx3BYebs7797Q1DmlhnTj9:1Lxhb5fxQ7BymTX9
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
SecuriteInfo.com.Script.SNH-gen.9465.5598.xls.doc .xls windows office2003