Behavioral task
behavioral1
Sample
e4bf8f4b3213903267b2dfd93ce884b7.xls
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e4bf8f4b3213903267b2dfd93ce884b7.xls
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
e4bf8f4b3213903267b2dfd93ce884b7
-
Size
86KB
-
MD5
e4bf8f4b3213903267b2dfd93ce884b7
-
SHA1
aa2c205ecd82ab55ab93c3043741cedf775f2028
-
SHA256
1ca6114f5f3cfff998a0d24db09a8c658ee48fb8d86f27003137781534e05de4
-
SHA512
4b3c64e41bac6e3d37f0e417202e762e3fd8815ec0fa85cdfdc5b8b992dfb961a53b39275f47da2b278f926c6200230f4b31e09fafc7c03632c0c26a035cfeba
-
SSDEEP
1536:R4dvxHlcaQPy0iWYOcG4BDhnxDV8ixSrx0wfd9EI8H0:R4dvxHlcaAy0iWYOcG4BDhnxDV8ixSSa
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e4bf8f4b3213903267b2dfd93ce884b7.xls .vbs windows office2003
ЭтаКнига
Лист1
Лист2
Лист3
Module1
Module2