Behavioral task
behavioral1
Sample
1c7e3e898dfb14f8726c94c9d40969b4.xls
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c7e3e898dfb14f8726c94c9d40969b4.xls
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
1c7e3e898dfb14f8726c94c9d40969b4
-
Size
47KB
-
MD5
1c7e3e898dfb14f8726c94c9d40969b4
-
SHA1
deaed0f1de436949965e8533c5144f0e2d9222ad
-
SHA256
d481fbd2852fc1e8e46f7d09cfb9dad7107b6cf295e2868785a2778b4b9fbfcb
-
SHA512
2abb39a680560296aaa1754b325404619a6e47095a2d113ea291a6d5c6876cf16d4f18c1c07137718f4c9a37332f32c690e6b6347d3f008d8e960a1506c08989
-
SSDEEP
768:6qlzrTxEtjPOtioVjDGUU1qfDlaGGx+kD/IEVQoZm9iKiSV9HZwXRum8i:trTxEtjPOtioVjDGUU1qfDlaGGx+kD/1
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1c7e3e898dfb14f8726c94c9d40969b4.xls windows office2003