Behavioral task
behavioral1
Sample
SecuriteInfo.com.Script.SNH-gen.3582.7373.xls
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Script.SNH-gen.3582.7373.xls
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Script.SNH-gen.3582.7373.xls
-
Size
571KB
-
MD5
a80beb34a1aac50e1793bf2319591c25
-
SHA1
cfb90cc383da510c57ee6d1cac9ca441e1bc1e7e
-
SHA256
4f20bc3c89338afb64cb3ad197cdc7d957f61ddf8e7536535ddbe28c1a09fc9c
-
SHA512
4c2a98835b5eb8127b93735c5d8ec3a46960253f55c1ca750c0fa16b5c3301daf7e544108b3ff3c1ce92fa7691accab77fc847d97828caecae8d12c98dff0b27
-
SSDEEP
6144:c3RQCEqhx4eKc5bJzRAZR3BYebsa7QnDmoWYep71:cvxhbjcRQ6mmm01
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
SecuriteInfo.com.Script.SNH-gen.3582.7373.xls.doc .xls windows office2003