Behavioral task
behavioral1
Sample
38aa4cbe5a8a63f21698b7ac4557ede3.xls
Resource
win7-20221111-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
38aa4cbe5a8a63f21698b7ac4557ede3.xls
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
38aa4cbe5a8a63f21698b7ac4557ede3
-
Size
1.6MB
-
MD5
38aa4cbe5a8a63f21698b7ac4557ede3
-
SHA1
6d2579cf0cd76ade25e8c5f95835a6b6375e5511
-
SHA256
3e31d3c6b704840eaebcdf6f91811e51d18909a4e97fbc6993ff9a61bb8bbd56
-
SHA512
2e72f8e12b99a356fb2cad7c69b7ca7b02a0cfb89b9945bdae0550426ee255a64049b2358528cffd4f30c087c1031f19bd7b60b086f55afffe95847e58027b2c
-
SSDEEP
12288:7fbfPMHGhvjqVS+4jGQbNsS0Z7xCYK37zcxzuBDo2LohapAs4grcbRKfikmaGK+W:7fDPxsS0fCYU7zcxzutrp/4zR3mmYR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
38aa4cbe5a8a63f21698b7ac4557ede3.xls windows office2003