Behavioral task
behavioral1
Sample
d6689b4a70e043fb1d5351d796ec9a6ad73c996108de47cd6d1d34a5e7ec82c0.xls
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
300 seconds
General
-
Target
9732726047.zip
-
Size
464KB
-
MD5
acb5fe6a83d2b07979c083f0aa7ad4b0
-
SHA1
6167b9202832e4841bc3c4c9bcd3aa2a188f7ca3
-
SHA256
56273cab52a97cc1d925441f394f6e30972f11f2953792a5570517a2d62cddb6
-
SHA512
9b6e2278a82592f773f9e69a4e668dfa45db3a160deeb4d422e2d338ea69797eedb0d25ae3c53e035194f6047eff1dab3472120364d572d81e11e3269c3e5161
-
SSDEEP
12288:I9/3TNeK/Dw0RQNUFNCNTToZ5Vydv+XOKbIq4c:Ix3xfwcmTTu5Mdv+XbV
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/d6689b4a70e043fb1d5351d796ec9a6ad73c996108de47cd6d1d34a5e7ec82c0 office_macro_on_action
Files
-
9732726047.zip.zip
Password: infected
-
d6689b4a70e043fb1d5351d796ec9a6ad73c996108de47cd6d1d34a5e7ec82c0.xls windows office2003