Behavioral task
behavioral1
Sample
5dce5ebf1cf7f254e96c8231e79272500726ea5682911251f63f01c26843c4d9.xls
Resource
win7-20230220-en
windows7-x64
13 signatures
150 seconds
General
-
Target
10430063603.zip
-
Size
14KB
-
MD5
4fa95fd120cd7723b2c3beabeff2dd57
-
SHA1
51cb9629b0e93b9660f0c0677ff4873b31d223b8
-
SHA256
8e949c67de4c95126b2244c251c5e892b49a908ba89b7fda6576850f95633f31
-
SHA512
63edf4d508bb7650a2339ec7d20b206810cb7121fac26c56e8803cfce578ffbe7239242cad853e6438e017e314d6c51a1c9805a8d0a01bf8e0d3bb9bee6272fa
-
SSDEEP
384:cjdE9lxErHMPH3ulqpW2MypWYlyqkBThDrKrNJL:aUHH3Eqc2MoWcL8ThDrKT
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/5dce5ebf1cf7f254e96c8231e79272500726ea5682911251f63f01c26843c4d9 office_macro_on_action
Files
-
10430063603.zip.zip
Password: infected
-
5dce5ebf1cf7f254e96c8231e79272500726ea5682911251f63f01c26843c4d9.xls windows office2003