Behavioral task
behavioral1
Sample
373e146df7ef606b742535ca57c01cb9.xls
Resource
win7-20220901-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
373e146df7ef606b742535ca57c01cb9.xls
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
373e146df7ef606b742535ca57c01cb9
-
Size
137KB
-
MD5
373e146df7ef606b742535ca57c01cb9
-
SHA1
dbe6ed9ecda22e87b8d0dbc381452af837a69412
-
SHA256
820852b8a7d0cbd7ab8976390261f6bb992bc282b46adf3041ea1cb41d8d4da9
-
SHA512
abf2779220c58b132974fd9984ed56caa69ac09aebcf2771456e541566b39e6c1269fb80b0c5d0b1e651700859dbcfe366bcbd87561aee5bd0848cbc19e99490
-
SSDEEP
3072:qdWpn5XB7pakqMGgLzUV1z+M/TOmMYMQD:zp5XpEkZGgu+M/qYMq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
373e146df7ef606b742535ca57c01cb9.xls windows office2003
Module1
ThisWhcncorkbook
Sheet1
Sheet2
Sheet3