Behavioral task
behavioral1
Sample
ea1e36b71775bf7affa6e73fb38ab8d3.xls
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
ea1e36b71775bf7affa6e73fb38ab8d3.xls
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
ea1e36b71775bf7affa6e73fb38ab8d3
-
Size
47KB
-
MD5
ea1e36b71775bf7affa6e73fb38ab8d3
-
SHA1
05941b4451e6f160d35a8eb34e8758c5101bf3b2
-
SHA256
17ca69aeabcc5bc3aa3fbad0bb0cbdf1d30a6178d4e3682c7a0f74e7bd5bd626
-
SHA512
a458df4b2afa468e8795ca51a357f35eb6e863b8dae6c5ebd9451e621f67aec7f13acdfc0319a93b5ba737d0b7977be34a725a782d406eb2d665ad58273a5fc5
-
SSDEEP
768:XqlzrTxEtjPOtioVjDGUU1qfDlaGGx+kD/IEVQoZm9iKiSV9HZwXRum8i:yrTxEtjPOtioVjDGUU1qfDlaGGx+kD/1
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ea1e36b71775bf7affa6e73fb38ab8d3.xls windows office2003