Behavioral task
behavioral1
Sample
f09f54a8c694a8b026051b90fd0f92040d952b75446af726de55522ef1e13dda.xls
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f09f54a8c694a8b026051b90fd0f92040d952b75446af726de55522ef1e13dda.xls
-
Size
140KB
-
MD5
784c8beac43a6f6de17a8f05299d528f
-
SHA1
636573702a1feec449e3e13e1366221e1baff96d
-
SHA256
f09f54a8c694a8b026051b90fd0f92040d952b75446af726de55522ef1e13dda
-
SHA512
af399f746e803c9f709a99c0430a8c7faca696fb59fbfde53f12e386fb9f116f8175b61835d86ed02bac26c535a903e88b4cb9add91ed6cedb9a5f8fad030de4
-
SSDEEP
3072:HrxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAIWpnUXB7pqkCkGSjrU91z+M/7OmGie:LxEtjPOtioVjDGUU1qfDlavx+W2QnA1d
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
f09f54a8c694a8b026051b90fd0f92040d952b75446af726de55522ef1e13dda.xls.xls windows office2003
Module1
ThisWorkbook
Sheet1
Sheet2
Sheet3