Behavioral task
behavioral1
Sample
b3779547d7a143c83f1df9d7ed49c5bc.xls
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b3779547d7a143c83f1df9d7ed49c5bc.xls
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
b3779547d7a143c83f1df9d7ed49c5bc
-
Size
137KB
-
MD5
b3779547d7a143c83f1df9d7ed49c5bc
-
SHA1
36a327ec68c95cc0f90e5e9b784402c05a20c8cd
-
SHA256
c23b945a7767d7a05f966ccb5bdd8dcfae0afcb288acdf6bc1ce6132df849cd5
-
SHA512
fc1f93164b78f086963e7c5241ef02413fd121c41861124303042675760faccc6c547ffdc590f56feb3e67ce54d072aa23685960f878274972e3ec276c645812
-
SSDEEP
3072:PdWpn5XB7pakqMGgLzUV1z+M/TOmMYMQy:0p5XpEkZGgu+M/qYMz
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b3779547d7a143c83f1df9d7ed49c5bc.xls windows office2003
Module1
ThisWhcncorkbook
Sheet1
Sheet2
Sheet3